Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.900220
Categoría:Buffer overflow
Título:Trend Micro OfficeScan Server cgiRecvFile.exe Buffer Overflow Vulnerability.
Resumen:Trend Micro OfficeScan is prone to a buffer overflow vulnerability.
Descripción:Summary:
Trend Micro OfficeScan is prone to a buffer overflow vulnerability.

Vulnerability Insight:
The flaw is due to error in cgiRecvFile.exe can be exploited
to cause a stack based buffer overflow by sending a specially crafted
HTTP request with a long ComputerName parameter.

Vulnerability Impact:
Remote exploitation could allow execution of arbitrary code to
cause complete compromise of system and failed attempt leads to denial of service condition.

Affected Software/OS:
Trend Micro OfficeScan Corporate Edition version 8.0

Trend Micro OfficeScan Corporate Edition versions 7.0 and 7.3

Trend Micro Client Server Messaging Security (CSM) for SMB versions 2.x and 3.x

Solution:
Partially Fixed.

Fix is available for Trend Micro OfficeScan 8.0, 7.3 and Client Server Messaging Security (CSM) 3.6.
Please see the references for more information.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2008-2437
BugTraq ID: 31139
http://www.securityfocus.com/bid/31139
Bugtraq: 20080912 Secunia Research: Trend Micro OfficeScan "cgiRecvFile.exe" Buffer Overflow (Google Search)
http://www.securityfocus.com/archive/1/496281/100/0/threaded
http://secunia.com/secunia_research/2008-35/
http://www.securitytracker.com/id?1020860
http://secunia.com/advisories/31342
http://securityreason.com/securityalert/4263
http://www.vupen.com/english/advisories/2008/2555
XForce ISS Database: trendmicro-cgirecvfile-bo(45072)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45072
CopyrightCopyright (C) 2008 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.