Trend Micro ControlManager < 3.0 SP5 Multiple Vulnerabilities

high Nessus Plugin ID 20401

Synopsis

The remote web server is vulnerable to remote code execution.

Description

The remote host appears to be running Trend Micro ControlManager.

The version of ControlManager is vulnerable to a buffer overrun in CGI programs that could allow a remote attacker to execute code in the context of ControlManager. This version is also vulnerable to a denial of service (DoS) attack in the way it handles ISAPI requests.

Note that ControlManager under Windows runs with SYSTEM privileges, which means an attacker can gain complete control of the affected host.

Solution

Apply Trend Micro Service Pack 5 for ControlManager 3.0.

See Also

http://www.trendmicro.com/download/product.asp?productid=7

Plugin Details

Severity: High

ID: 20401

File Name: trendmicro_controlmanager_multiple.nasl

Version: 1.22

Type: remote

Family: CGI abuses

Published: 1/13/2006

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:trend_micro:control_manager

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Patch Publication Date: 7/11/2005

Vulnerability Publication Date: 12/14/2005

Reference Information

CVE: CVE-2005-1929

BID: 15865, 15866, 15867