Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

Trend Micro OfficeScan CGI Parsing Buffer Overflow Vulnerability
Information
Severity
Severity
Critical
Family
Family
Buffer overflow
CVSSv2 Base
CVSSv2 Base
10.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
14 years ago
Modified
Modified
4 years ago
Summary
This host is installed with Trend Micro OfficeScan and is prone to stack based buffer overflow vulnerability. The vulnerability is due to boundary error in the CGI modules when processing specially crafted HTTP request.
Affected Software
Affected Software
TrendMicro OfficeScan Corporate Edition 7.3 Build prior to 1374. TrendMicro OfficeScan Corporate Edition 8.0 Build prior to 3110.
Solution
Solution
Apply the referenced updates.
Common Vulnerabilities and Exposures (CVE)
References
- http://secunia.com/advisories/32005/
- http://seclists.org/bugtraq/2008/Oct/0169.html
- http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_CriticalPa
- http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_sp1p1_Crit
- http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_SP1_Patch1_Win
- http://www.trendmicro.com/ftp/products/patches/OSCE_7.3_Win_EN_Critica