This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Trend Micro First view 2006-10-10
Product Officescan Corporate Edition Last view 2008-03-17
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:trend_micro:officescan_corporate_edition:7.0:*:*:*:*:*:*:* 4
cpe:2.3:a:trend_micro:officescan_corporate_edition:7.3:*:*:*:*:*:*:* 4
cpe:2.3:a:trend_micro:officescan_corporate_edition:6.5:*:*:*:*:*:*:* 3

Related : CVE

  Date Alert Description
5 2008-03-17 CVE-2008-1366

Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to cause a denial of service (process consumption) via (1) an HTTP request without a Content-Length header or (2) invalid characters in unspecified CGI arguments, which triggers a NULL pointer dereference.

6.4 2008-03-17 CVE-2008-1365

Stack-based buffer overflow in Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long encrypted password, which triggers the overflow in (1) cgiChkMasterPwd.exe, (2) policyserver.exe as reachable through cgiABLogon.exe, and other vectors.

9.3 2007-02-20 CVE-2007-0325

Multiple buffer overflows in the Trend Micro OfficeScan Web-Deployment SetupINICtrl ActiveX control in OfficeScanSetupINI.dll, as used in OfficeScan 7.0 before Build 1344, OfficeScan 7.3 before Build 1241, and Client / Server / Messaging Security 3.0 before Build 1197, allow remote attackers to execute arbitrary code via a crafted HTML document.

6.4 2006-10-10 CVE-2006-5211

Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to remove OfficeScan clients via a certain HTTP request that invokes the OfficeScan CGI program.

CWE : Common Weakness Enumeration

%idName
66% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
33% (1) CWE-20 Improper Input Validation

SAINT Exploits

Description Link
Trend Micro OfficeScan client ActiveX control buffer overflow More info here
Trend Micro OfficeScan Policy Server CGI buffer overflow More info here

Open Source Vulnerability Database (OSVDB)

id Description
43513 Trend Micro OfficeScan Unspecified CGI Argument NULL Dereference Remote DoS
43512 Trend Micro OfficeScan Content-Length Header HTTP Request Handling Remote DoS
42500 Trend Micro OfficeScan PolicyServer.exe cgiABLogon.exe CGI Module pwd Variabl...
42499 Trend Micro OfficeScan cgiChkMasterPwd.exe TMLogonEncrypted Variable Remote O...
33040 Trend Micro OfficeScan SetupINICtrl ActiveX (OfficeScanSetupINI.dll) Multiple...
29461 Trend Micro OfficeScan Crafted HTTP Request Client Removal

Snort® IPS/IDS

Date Description
2014-01-10 Trend Micro OfficeScan CGI password decryption buffer overflow attempt
RuleID : 17605 - Type : SERVER-WEBAPP - Revision : 9
2014-01-10 Trend Micro OfficeScan CGI password decryption buffer overflow attempt
RuleID : 13591 - Type : SERVER-WEBAPP - Revision : 9
2014-01-10 Trend Micro OfficeScan Client ActiveX function call access
RuleID : 10175 - Type : BROWSER-PLUGINS - Revision : 11
2014-01-10 Trend Micro OfficeScan Client ActiveX clsid unicode access
RuleID : 10174 - Type : WEB-ACTIVEX - Revision : 7
2014-01-10 Trend Micro OfficeScan Client ActiveX clsid access
RuleID : 10173 - Type : BROWSER-PLUGINS - Revision : 11

Nessus® Vulnerability Scanner

id Description
2007-02-21 Name: The remote Windows host is affected by a remote buffer overflow vulnerability.
File: trendmicro_ofscan_buffer_overflow.nasl - Type: ACT_GATHER_INFO
2006-07-14 Name: The remote web server is vulnerable to remote code execution.
File: trendmicro_officescan_multiple.nasl - Type: ACT_ATTACK