-
Trend Micro Products vulnerability
Trend Micro Products UPX Processing Buffer Overflow Vulnerability
Secunia Advisory: SA24087 Release Date: 2007-02-08
Critical: Highly critical
Impact: DoS; System access
Where: From remote
Solution Status: Vendor Patch
Software:
Trend Micro Client Server Messaging Security for SMB 3.x
Trend Micro Client Server Security for SMB 3.x
Trend Micro Control Manager (TMCM) 3.x
Trend Micro InterScan AppletTrap 2.x
Trend Micro InterScan eManager 3.x
Trend Micro InterScan Messaging Security Suite 5.x
Trend Micro InterScan VirusWall 3.x
Trend Micro InterScan Web Security Suite 1.x
Trend Micro InterScan Web Security Suite 2.x
Trend Micro InterScan WebManager 2.x
Trend Micro InterScan WebProtect for ISA 3.x
Trend Micro OfficeScan Corporate Edition 3.x
Trend Micro OfficeScan Corporate Edition 5.x
Trend Micro OfficeScan Corporate Edition 6.x
Trend Micro OfficeScan Corporate Edition 7.x
Trend Micro PC-cillin 2000
Trend Micro PC-cillin 2002
Trend Micro PC-cillin 2003
Trend Micro PC-cillin Internet Security 2005
Trend Micro PC-cillin Internet Security 2006 / 14.x
Trend Micro PC-cillin Internet Security 2007
Trend Micro PortalProtect for SharePoint 1.x
Trend Micro ScanMail eManager 3.x
Trend Micro ScanMail eManager 5.x
Trend Micro ScanMail for Lotus Notes 2.x
Trend Micro ScanMail for Lotus Notes 3.x
Trend Micro ScanMail for Microsoft Exchange 3.x
Trend Micro ScanMail for Microsoft Exchange 6.x
Trend Micro ScanMail for Microsoft Exchange 7.x
Trend Micro ScanMail for Openmail 2.x
Trend Micro ServerProtect for Linux 1.x
Trend Micro ServerProtect for Windows/NetWare 5.x
Description:
A vulnerability has been reported in Trend Micro products, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
The vulnerability is caused due to an error within the processing of UPX compressed executables. This can be exploited to cause a buffer overflow when scanning a specially crafted UPX compressed executable file.
Successful exploitation may allow execution of arbitrary code or cause the system to crash.
The vulnerability reportedly affects all Trend Micro products and versions that use the Scan Engine and Pattern File technology.
Solution: Update the virus pattern file to 4.245.00 or higher.
Provided and/or discovered by: Discovered by an anonymous person and reported via iDefense Labs.
Original Advisory: Trend Micro: http://esupport.trendmicro.com/suppo...tID=EN-1034289
iDefense Labs: http://labs.idefense.com/intelligenc...lay.php?id=470
secunia.com
Последний раз редактировалось Shu_b; 09.02.2007 в 13:31.
-
-
Будь в курсе!
Будь в курсе!
Надоело быть жертвой? Стань профи по информационной безопасности, получай самую свежую информацию об угрозах и средствах защиты от ведущего российского аналитического центра Anti-Malware.ru:
-
Trend Micro Products IOCTL Handler Privilege Escalation
Trend Micro Products IOCTL Handler Privilege Escalation
Secunia Advisory: SA24069 Release Date: 2007-02-08
Critical: Less critical
Impact: Privilege escalation
Where: Local system
Solution Status: Vendor Patch
Software:
Trend Micro Anti-Spyware 3.x
Trend Micro Anti-Spyware for Enterprise 3.x
Trend Micro Anti-Spyware for SMB 3.x
Trend Micro Client Server Messaging Security for SMB 3.x
Trend Micro Damage Cleanup Services 3.x
Trend Micro PC-cillin Internet Security 2007
Description:
A vulnerability has been reported in various Trend Micro products, which can be exploited by malicious, local users to gain escalated privileges.
Insufficient address space verification within the IOCTL handlers of the TmComm.sys device driver and insecure permissions on the \\.\TmComm DOS device interface can be exploited e.g. to access certain IOCTL handlers and overwrite arbitrary memory and execute code with kernel privileges.
The vulnerability reportedly affects the following products:
* Trend Micro PC-cillin Internet Security 2007
* Trend Micro Antivirus 2007
* Trend Micro Anti-Spyware for SMB 3.2 SP1
* Trend Micro Anti-Spyware for Consumer 3.5
* Trend Micro Anti-Spyware for Enterprise 3.0 SP2
* Client / Server / Messaging Security for SMB 3.5
* Damage Cleanup Services 3.2
Solution: Update the Anti-Rootkit Common Module (RCM) to version 1.600-1052.
Provided and/or discovered by: Discovered by Ruben Santamarta and reported via iDefense Labs.
Original Advisory: Trend Micro: http://esupport.trendmicro.com/suppo...&id=EN-1034432
iDefense Labs: http://labs.idefense.com/intelligenc...lay.php?id=469
secunia.com
-
-
Переполнение буфера при обработке UPX файлов в продуктах Trend Micro
Переполнение буфера при обработке UPX файлов в продуктах Trend Micro
Программа:
Trend Micro ServerProtect for Windows/NetWare 5.x
Trend Micro ServerProtect for Linux 1.x
Trend Micro ScanMail for Openmail 2.x
Trend Micro ScanMail for Microsoft Exchange 7.x
Trend Micro ScanMail for Microsoft Exchange 6.x
Trend Micro ScanMail for Microsoft Exchange 3.x
Trend Micro ScanMail for Lotus Notes 3.x
Trend Micro ScanMail for Lotus Notes 2.x
Trend Micro ScanMail eManager 5.x
Trend Micro ScanMail eManager 3.x
Trend Micro PortalProtect for SharePoint 1.x
Trend Micro PC-cillin Internet Security 2007
Trend Micro PC-cillin Internet Security 2006 / 14.x
Trend Micro PC-cillin Internet Security 2005
Trend Micro PC-cillin 2003
Trend Micro PC-cillin 2002
Trend Micro PC-cillin 2000
Trend Micro OfficeScan Corporate Edition 7.x
Trend Micro OfficeScan Corporate Edition 6.x
Trend Micro OfficeScan Corporate Edition 5.x
Trend Micro OfficeScan Corporate Edition 3.x
Trend Micro InterScan WebProtect for ISA 3.x
Trend Micro InterScan WebManager 2.x
Trend Micro InterScan Web Security Suite 2.x
Trend Micro InterScan Web Security Suite 1.x
Trend Micro InterScan VirusWall 3.x
Trend Micro InterScan Messaging Security Suite 5.x
Trend Micro InterScan eManager 3.x
Trend Micro InterScan AppletTrap 2.x
Trend Micro Control Manager (TMCM) 3.x
Trend Micro Client Server Messaging Security for SMB 3.x
Trend Micro Client Server Security for SMB 3.x
Опасность: Критическая
Наличие эксплоита: Нет
Описание:
Уязвимость позволяет удаленному пользователю выполнить произвольный код на целевой системе.
Уязвимость существует из-за ошибки при обработке UPX файлов. Удаленный пользователь может с помощью специально сформированного UPX-сжатого файла вызвать переполнение буфера и вызвать отказ в обслуживании приложения или выполнить произвольный код на целевой системе.
URL производителя: www.trendmicro.com
Решение: Установите обновление с сайта производителя.
securitylab.ru
-