Trend Micro OfficeScan HTTP Request Remote Buffer Overflow

High Nessus Plugin ID 34490


The remote host contains an application that is affected by a buffer overflow vulnerability.


Trend Micro OfficeScan is installed on the remote host. The installed version is affected by a buffer overflow vulnerability. By sending a specially crafted HTTP request to Trend Micro OfficeScan server CGI modules, it may be possible to trigger a stack-based buffer overflow.

Successful exploitation of this issue may result in arbitrary code execution on the remote system.


Upgrade to :

- Trend Micro Worry-Free Business Security 5.0 Build 1418
- Trend Micro OfficeScan 7.3 Build 1374
- Trend Micro OfficeScan 8.0 Build 3110

See Also

Plugin Details

Severity: High

ID: 34490

File Name: trendmicro_officescan_http_buffer_overflow.nasl

Version: $Revision: 1.13 $

Type: local

Agent: windows

Family: Windows

Published: 2008/10/24

Modified: 2013/04/25

Dependencies: 10107, 13855

Risk Information

Risk Factor: High


Base Score: 8.3

Temporal Score: 6.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:trend_micro:officescan

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2008/10/22

Exploitable With

CANVAS (D2ExploitPack)

Reference Information

CVE: CVE-2008-3862

BID: 31859

OSVDB: 49275

Secunia: 32005

CWE: 119