|Check Point Reference:||CPAI-2006-303|
|Date Published:||18 Oct 2009|
|Last Updated:||26 Dec 2017|
|Protection Provided by:||
|Who is Vulnerable?|
|Vulnerability Description||The Trend Micro OfficeScan product is a centralized virus and security scan management system. It is meant to consolidate the coordination of security scan actions and the management of Trend Micro virus scanner products installed on the nodes of an enterprise network. The product is a central command center for the management of infections or vulnerabilities, as well as information regarding virus events or unusual activity. There exists a format string vulnerability in Trend Micro OfficeScan. The vulnerability is due to a format string flaw in the Atxconsole ActiveX control, which allows for a buffer overflow and a potential diversion of the code execution flow. A remote attacker may exploit the vulnerability by enticing the target user to open a malicious HTML page, resulting in the execution of arbitrary code on the vulnerable host in the security context of the target browser. In an attack case where code injection is not successful, the browser which loads the ActiveX object will terminate abnormally. In a more sophisticated attack attempt which results in successful code injection, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user account.|
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Client Enforcement Violation.
Attack Information: Trend Micro OfficeScan Atxconsole ActiveX control format string