Trend Micro OfficeScan HTTP Request Remote Buffer Overflow

high Nessus Plugin ID 34490

Synopsis

The remote host contains an application that is affected by a buffer overflow vulnerability.

Description

Trend Micro OfficeScan is installed on the remote host. The installed version is affected by a buffer overflow vulnerability. By sending a specially crafted HTTP request to Trend Micro OfficeScan server CGI modules, it may be possible to trigger a stack-based buffer overflow.

Successful exploitation of this issue may result in arbitrary code execution on the remote system.

Solution

Upgrade to :

- Trend Micro Worry-Free Business Security 5.0 Build 1418
- Trend Micro OfficeScan 7.3 Build 1374
- Trend Micro OfficeScan 8.0 Build 3110

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2008-40/

http://www.nessus.org/u?9805a21c

http://www.nessus.org/u?2b7bfd4c

http://www.nessus.org/u?01759f7a

Plugin Details

Severity: High

ID: 34490

File Name: trendmicro_officescan_http_buffer_overflow.nasl

Version: 1.15

Type: local

Agent: windows

Family: Windows

Published: 10/24/2008

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.9

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:trend_micro:officescan

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/22/2008

Exploitable With

CANVAS (D2ExploitPack)

Reference Information

CVE: CVE-2008-3862

BID: 31859

CWE: 119

Secunia: 32005