Trend Micro DirectPass < 1.6.0.1015 Multiple Vulnerabilities

Medium Nessus Plugin ID 66811

Synopsis

The remote Windows host contains a program that is potentially affected
by multiple vulnerabilities.

Description

The version of Trend Micro DirectPass on the remote Windows host is
earlier than 1.6.0.1015 and is, therefore, potentially affected by the
following vulnerabilities :

- An input validation error exists in the file
'InstallWorkspace.exe' related to the 'Master Password'
field that could allow persistent cross-site scripting
attacks.

- An error exists in the file 'InstallWorkspace.exe'
related to the 'Master Password' module that could
allow a security bypass and arbitrary command execution.

- An error exists in the files 'InstallWorkspace.exe' and
'libcef.dll' that could allow denial of service attacks
because of dereferencing a NULL pointer.

Solution

Upgrade to version 1.6.0.1015.

See Also

http://esupport.trendmicro.com/solution/en-US/1096805.aspx

https://seclists.org/fulldisclosure/2013/May/112

Plugin Details

Severity: Medium

ID: 66811

File Name: trendmicro_directpass_1_6_0_1015.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 2013/06/05

Modified: 2018/11/15

Dependencies: 13855

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.4

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: x-cpe:/a:trend_micro:directpass

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/05/09

Vulnerability Publication Date: 2013/05/21

Reference Information

BID: 60023

EDB-ID: 25719

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990