Check Point Advisories

Update Protection against Trend Micro OfficeScan Server cgiRecvFile Buffer Overflow

Check Point Reference: CPAI-2008-221
Date Published: 26 Sep 2008
Severity: High
Last Updated: Tuesday 01 January, 2008
Source: Secunia: SA31342
Industry Reference:CVE-2008-2437
Protection Provided by:
Who is Vulnerable? Trend Micro Client Server Messaging Security for SMB 2.0
Trend Micro Client Server Messaging Security for SMB 3.0
Trend Micro Client Server Messaging Security for SMB 3.5
Trend Micro Client Server Messaging Security for SMB 3.6
Trend Micro OfficeScan Corporate Edition 7.3
Trend Micro OfficeScan Corporate Edition 8.x
Vulnerability Description A buffer overflow vulnerability exists in Trend Micro OfficeScan, which if successfully exploited, allows execution of arbitrary code. Trend Micro OfficeScan is a centralized virus and security scan management system. The application fails to properly handle specially crafted ,user-supplied parameters, allowing an attacker to compromise a vulnerable computer.  
Vulnerability StatusCurrently, there are no known expolits.
Update/Patch AvaliableTrend Micro has released fixes to address the issue:

Trend Micro OfficeScan 7.3:
http://www.trendmicro.com/ftp/product...CE_7.3_Win_EN_CriticalPatch_B1367.exe

Trend Micro OfficeScan 7.0:
http://www.trendmicro.com/ftp/product...CE_7.0_Win_EN_CriticalPatch_B1400.exe

Trend Micro OfficeScan 8.0:
http://www.trendmicro.com/ftp/product...CE_8.0_Win_EN_CriticalPatch_B1361.exe

Trend Micro OfficeScan 8.0 Service Pack 1:
http://www.trendmicro.com/ftp/product....0_SP1_Win_EN_CriticalPatch_B2424.exe

Trend Micro OfficeScan 8.0 Service Pack 1 Patch 1:
http://www.trendmicro.com/ftp/product...Patch1_Win_EN_CriticalPatch_B3060.exe

Trend Micro Client Server Messaging Security 3.6:
http://www.trendmicro.com/ftp/product...CE_7.6_Win_EN_CriticalPatch_B1195.exe
Vulnerability DetailsThe vulnerability is due to a boundary error in cgiRecvFile.exe. This can be exploited to cause a stack-based buffer overflow via an HTTP request with a specially crafted, overly long "ComputerName" parameter.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK