This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Trend Micro First view 2001-01-09
Product Interscan Viruswall Last view 2007-02-08
Version 3.0.1 Type Application
Update *  
Edition unix  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:trend_micro:interscan_viruswall

Activity : Overall

Related : CVE

  Date Alert Description
9.3 2007-02-08 CVE-2007-0851

Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.

7.5 2005-05-02 CVE-2005-0533

Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

10 2001-03-12 CVE-2001-0133

The web administration interface for Interscan VirusWall 3.6.x and earlier does not use encryption, which could allow remote attackers to obtain the administrator password to sniff the administrator password via the setpasswd.cgi program or other HTTP GET requests that contain base64 encoded usernames and passwords.

1.2 2001-03-12 CVE-2001-0132

Interscan VirusWall 3.6.x and earlier follows symbolic links when uninstalling the product, which allows local users to overwrite arbitrary files via a symlink attack.

4.6 2001-01-09 CVE-2000-1106

Trend Micro InterScan VirusWall creates an "Intscan" share to the "InterScan" directory with permissions that grant Full Control permissions to the Everyone group, which allows attackers to gain privileges by modifying the VirusWall programs.

Open Source Vulnerability Database (OSVDB)

id Description
33038 Trend Micro Multiple Products UPX Handling Overflow
14133 Trend Micro Multiple Anti-Virus Products ARJ Archive Handling Overflow
6165 Trend Micro Interscan VirusWall Password Disclosure
6164 Trend Micro Interscan VirusWall SymLink File Overwrite
1668 Trend Micro InterScan VirusWall Shared Directory Privilege Escalation

OpenVAS Exploits

id Description
2005-11-03 Name : Various dangerous cgi scripts
File : nvt/dangerous_cgis.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2007-A-0013 Trend Micro Antivirus UPX Compressed PE File Buffer Overflow Vulnerability
Severity: Category I - VMSKEY: V0013605

Snort® IPS/IDS

Date Description
2014-01-10 Trend Micro Interscan VirusWall setpasswd.cgi access
RuleID : 2219-community - Type : SERVER-WEBAPP - Revision : 18
2014-01-10 Trend Micro Interscan VirusWall setpasswd.cgi access
RuleID : 2219 - Type : SERVER-WEBAPP - Revision : 18
2014-01-10 Trend Micro Products Antivirus Library overflow attempt
RuleID : 15992 - Type : FILE-OTHER - Revision : 7

Nessus® Vulnerability Scanner

id Description
2007-02-21 Name: The remote Windows host is vulnerable to a buffer overflow attack.
File: trendmicro_upx_parsing.nasl - Type: ACT_GATHER_INFO
2005-02-24 Name: The remote host is running an application that is affected by a buffer overfl...
File: trendmicro_arj_overflow.nasl - Type: ACT_GATHER_INFO
2003-06-17 Name: The remote web server may contain some dangerous CGI scripts.
File: dangerous_cgis.nasl - Type: ACT_ATTACK