Trend Micro Products vulnerability
[B]Trend Micro Products UPX Processing Buffer Overflow Vulnerability [/B]
[SIZE="1"][I]Secunia Advisory: SA24087 Release Date: 2007-02-08
[/I][/SIZE]
[B]Critical: [COLOR="Red"]Highly critical[/COLOR]
Impact:[/B] DoS; System access
[B]Where:[/B] From remote
[B]Solution Status: [COLOR="SeaGreen"]Vendor Patch[/COLOR][/B]
[B]Software:[/B]
[SIZE="1"]Trend Micro Client Server Messaging Security for SMB 3.x
Trend Micro Client Server Security for SMB 3.x
Trend Micro Control Manager (TMCM) 3.x
Trend Micro InterScan AppletTrap 2.x
Trend Micro InterScan eManager 3.x
Trend Micro InterScan Messaging Security Suite 5.x
Trend Micro InterScan VirusWall 3.x
Trend Micro InterScan Web Security Suite 1.x
Trend Micro InterScan Web Security Suite 2.x
Trend Micro InterScan WebManager 2.x
Trend Micro InterScan WebProtect for ISA 3.x
Trend Micro OfficeScan Corporate Edition 3.x
Trend Micro OfficeScan Corporate Edition 5.x
Trend Micro OfficeScan Corporate Edition 6.x
Trend Micro OfficeScan Corporate Edition 7.x
Trend Micro PC-cillin 2000
Trend Micro PC-cillin 2002
Trend Micro PC-cillin 2003
Trend Micro PC-cillin Internet Security 2005
Trend Micro PC-cillin Internet Security 2006 / 14.x
Trend Micro PC-cillin Internet Security 2007
Trend Micro PortalProtect for SharePoint 1.x
Trend Micro ScanMail eManager 3.x
Trend Micro ScanMail eManager 5.x
Trend Micro ScanMail for Lotus Notes 2.x
Trend Micro ScanMail for Lotus Notes 3.x
Trend Micro ScanMail for Microsoft Exchange 3.x
Trend Micro ScanMail for Microsoft Exchange 6.x
Trend Micro ScanMail for Microsoft Exchange 7.x
Trend Micro ScanMail for Openmail 2.x
Trend Micro ServerProtect for Linux 1.x
Trend Micro ServerProtect for Windows/NetWare 5.x[/SIZE]
[B]Description:[/B]
A vulnerability has been reported in Trend Micro products, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.
The vulnerability is caused due to an error within the processing of UPX compressed executables. This can be exploited to cause a buffer overflow when scanning a specially crafted UPX compressed executable file.
Successful exploitation may allow execution of arbitrary code or cause the system to crash.
The vulnerability reportedly affects all Trend Micro products and versions that use the Scan Engine and Pattern File technology.
[B]Solution:[/B] Update the virus pattern file to 4.245.00 or higher.
Provided and/or discovered by: Discovered by an anonymous person and reported via iDefense Labs.
Original Advisory: Trend Micro: [url]http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034289[/url]
iDefense Labs: [url]http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=470[/url]
[url=http://secunia.com/advisories/24087/]secunia.com[/url]
Trend Micro Products IOCTL Handler Privilege Escalation
[B]Trend Micro Products IOCTL Handler Privilege Escalation [/B]
[I][SIZE="1"]Secunia Advisory: SA24069 Release Date: 2007-02-08[/SIZE][/I]
[B]Critical: [COLOR="DarkOrange"]Less critical[/COLOR][/B]
[B]Impact:[/B] Privilege escalation
[B]Where:[/B] Local system
[B]Solution Status: [COLOR="SeaGreen"]Vendor Patch[/COLOR][/B]
[B]Software:[/B]
Trend Micro Anti-Spyware 3.x
Trend Micro Anti-Spyware for Enterprise 3.x
Trend Micro Anti-Spyware for SMB 3.x
Trend Micro Client Server Messaging Security for SMB 3.x
Trend Micro Damage Cleanup Services 3.x
Trend Micro PC-cillin Internet Security 2007
[B]Description:[/B]
A vulnerability has been reported in various Trend Micro products, which can be exploited by malicious, local users to gain escalated privileges.
Insufficient address space verification within the IOCTL handlers of the TmComm.sys device driver and insecure permissions on the \\.\TmComm DOS device interface can be exploited e.g. to access certain IOCTL handlers and overwrite arbitrary memory and execute code with kernel privileges.
The vulnerability reportedly affects the following products:
* Trend Micro PC-cillin Internet Security 2007
* Trend Micro Antivirus 2007
* Trend Micro Anti-Spyware for SMB 3.2 SP1
* Trend Micro Anti-Spyware for Consumer 3.5
* Trend Micro Anti-Spyware for Enterprise 3.0 SP2
* Client / Server / Messaging Security for SMB 3.5
* Damage Cleanup Services 3.2
[B]Solution:[/B] Update the Anti-Rootkit Common Module (RCM) to version 1.600-1052.
Provided and/or discovered by: Discovered by Ruben Santamarta and reported via iDefense Labs.
Original Advisory: Trend Micro: [url]http://esupport.trendmicro.com/suppor...ontentID=EN-1034432&id=EN-1034432[/url]
iDefense Labs: [url]http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=469[/url]
[url=http://secunia.com/advisories/24069/]secunia.com[/url]
Переполнение буфера при обработке UPX файлов в продуктах Trend Micro
[B]Переполнение буфера при обработке UPX файлов в продуктах Trend Micro[/B]
[B]Программа:[/B]
[SIZE="1"]Trend Micro ServerProtect for Windows/NetWare 5.x
Trend Micro ServerProtect for Linux 1.x
Trend Micro ScanMail for Openmail 2.x
Trend Micro ScanMail for Microsoft Exchange 7.x
Trend Micro ScanMail for Microsoft Exchange 6.x
Trend Micro ScanMail for Microsoft Exchange 3.x
Trend Micro ScanMail for Lotus Notes 3.x
Trend Micro ScanMail for Lotus Notes 2.x
Trend Micro ScanMail eManager 5.x
Trend Micro ScanMail eManager 3.x
Trend Micro PortalProtect for SharePoint 1.x
Trend Micro PC-cillin Internet Security 2007
Trend Micro PC-cillin Internet Security 2006 / 14.x
Trend Micro PC-cillin Internet Security 2005
Trend Micro PC-cillin 2003
Trend Micro PC-cillin 2002
Trend Micro PC-cillin 2000
Trend Micro OfficeScan Corporate Edition 7.x
Trend Micro OfficeScan Corporate Edition 6.x
Trend Micro OfficeScan Corporate Edition 5.x
Trend Micro OfficeScan Corporate Edition 3.x
Trend Micro InterScan WebProtect for ISA 3.x
Trend Micro InterScan WebManager 2.x
Trend Micro InterScan Web Security Suite 2.x
Trend Micro InterScan Web Security Suite 1.x
Trend Micro InterScan VirusWall 3.x
Trend Micro InterScan Messaging Security Suite 5.x
Trend Micro InterScan eManager 3.x
Trend Micro InterScan AppletTrap 2.x
Trend Micro Control Manager (TMCM) 3.x
Trend Micro Client Server Messaging Security for SMB 3.x
Trend Micro Client Server Security for SMB 3.x[/SIZE]
[B]Опасность: [color=#CC0000]Критическая[/color]
Наличие эксплоита:[/B] Нет
[B]Описание:[/B]
Уязвимость позволяет удаленному пользователю выполнить произвольный код на целевой системе.
Уязвимость существует из-за ошибки при обработке UPX файлов. Удаленный пользователь может с помощью специально сформированного UPX-сжатого файла вызвать переполнение буфера и вызвать отказ в обслуживании приложения или выполнить произвольный код на целевой системе.
URL производителя: [url]www.trendmicro.com[/url]
[B]Решение:[/B] Установите обновление с сайта производителя.
[url=http://www.securitylab.ru/vulnerability/290746.php]securitylab.ru[/url]