|Check Point Reference:||CPAI-2015-0352|
|Date Published:||26 Mar 2015|
|Last Updated:||26 Mar 2015|
|Protection Provided by:||
|Who is Vulnerable?|
|Vulnerability Description||Microsoft Outlook Express (OE) is an email, newsgroup and address book management client application. The application includes a stand-alone component called Address Book that manages the address book entries. An Address Book can contain entries for individual contacts as well as group lists that bundle individual contacts together. A vulnerability has been discovered in the way Microsoft Outlook Express parses malformed Windows Address Book (.wab) files. An attacker may exploit this vulnerability by enticing a user to open a crafted address book file. A successful attack can lead to the injection and execution of arbitrary code within the security context of the target user. In an attack case where code injection is not successful, the vulnerable wab.exe application will terminate immediately. In a more sophisticated attack that results in successful code injection, the behavior of the target system is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user.|
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated,
update your Security Gateway product to the latest IPS update.
For information on how to update IPS, go to
Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Content Protection Violation.
Attack Information: Microsoft Outlook Express Windows Address Book File Overflow (MS06-016) - Ver2