Check Point Advisories

Microsoft SChannel TLSv1 Denial of Service (MS10-085) - Ver2 (CVE-2010-3229)

Check Point Reference: CPAI-2014-2443
Date Published: 28 Dec 2014
Severity: High
Last Updated: 26 Nov 2017
Source:
Industry Reference:CVE-2010-3229
Protection Provided by:

Security Gateway
R80, R77, R76, R75

Who is Vulnerable?
Vulnerability Description The Secure Channel (SChannel) security package is a Security Support Provider (SSP) that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) Internet standard authentication protocols. SChannel is part of the security package that helps provide an authentication service to provide secure communications between client and server. A denial of service vulnerability has been reported in the way that SChannel processes client certificates in implementations of Internet Information Services (IIS) on Microsoft Windows. The vulnerability is caused by SChannel failing to check a logical condition before processing a protocol request during an SSL/TLS handshake. A remote attacker may exploit this issue by sending a specially crafted packet message to an affected IIS server hosting an SSL web site, which could cause LSASS to stop responding and consequently result in a denial of service.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update.For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R76 / R75

  1. In the IPS tab, click Protections and find the Microsoft SChannel TLSv1 Denial of Service (MS10-085) - Ver2 protection using the Search tool and Edit the protection's settings.
  2. Install policy on all modules.

This protection's log will contain the following information:

Attack Name:  SSL Protection Violation.
Attack Information:  Microsoft SChannel TLSv1 Denial of Service (MS10-085) - Ver2

This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO