[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Security Advisory - Checkpoint Endpoint Connect VPN - DLL Hijack



Security Advisory - Checkpoint Endpoint Connect VPN - DLL Hijack
================================================================================
Summary           : Checkpoint Endpoint Connect VPN is prone to DLL hijacking
Date              : 12 June 2012
Affected versions : Endpoint Security VPN R75
					Remote Access Clients E75.x
					Endpoint Security R73.x/E80.x (VPN blade)
ID                : sk76480
CVE reference     : CVE-2012-2753

Details
==========
A vulnerability in Checkpoint Endpoint Connect VPN causes the client to be
susceptible to an attack that result in arbitrary dynamic-library loading.

A user with local disk access can carefuly construct a DLL that suits a pattern
that is being traversed by the client and implement it somewhere along the
search path and the client will load it seamlessly.

Impact
==========
After the DLL has been implemented, an unsuspected user that will run the
program will cause it to load, resulting in arbitrary code execution with
user's privilege level.

Solution
==========
Apply the appropriate Hotfix released by Checkpoint (one line URL):
https://supportcenter.checkpoint.com/supportcenter/portal?
						eventSubmit_doGoviewsolutiondetails=&solutionid=sk76480

Credits
==========
The issue was responsibly reported by Moshe Zioni from Comsec Global Consulting.

Timeline
===========
11 June 2012
Checkpoint officialy announce a Hotfix for the issue
6 June 2012
Checkpoint reported on finishing a fix to the reported issue
16 May 2012
Further correspondance (Comsec-Checkpoint) took place, discussing a remidiation
15 May 2012
First response from Checkpoint Security Team
15 May 2012
Bug reported by Moshe Zioni from Comsec Global Consulting

References
===========
Checkpoint
http://www.checkpoint.com/
Comsec Global Consulting
http://www.comsecglobal.com/