Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Trend Micro OfficeScan Server cgiRecvFile.exe Buffer Overflow Vulnerability.
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This Remote host is installed with Trend Micro OfficeScan, which is prone to Buffer Overflow Vulnerability.
Insight
Insight
The flaw is due to error in cgiRecvFile.exe can be exploited to cause a stack based buffer overflow by sending a specially crafted HTTP request with a long ComputerName parameter.
Affected Software
Affected Software
Trend Micro OfficeScan Corporate Edition version 8.0 Trend Micro OfficeScan Corporate Edition versions 7.0 and 7.3 Trend Micro Client Server Messaging Security (CSM) for SMB versions 2.x and 3.x
Solution
Solution
Partially Fixed. Fix is available for Trend Micro OfficeScan 8.0, 7.3 and Client Server Messaging Security (CSM) 3.6. Please see the references for more information.
Common Vulnerabilities and Exposures (CVE)
References
- http://secunia.com/advisories/31342/
- http://securitytracker.com/alerts/2008/Sep/1020860.html
- http://www.juniper.net/security/auto/vulnerabilities/vuln31139.html
- http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_Win_EN_Critica
- http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_SP1_Win_EN_Cri
- http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_SP1_Patch1_Win
- http://www.trendmicro.com/ftp/products/patches/OSCE_7.3_Win_EN_Critica
- http://www.trendmicro.com/ftp/products/patches/CSM_3.6_OSCE_7.6_Win_EN