Summary
Detail | |||
---|---|---|---|
Vendor | Trend Micro | First view | 2001-01-09 |
Product | Interscan Viruswall | Last view | 2007-02-08 |
Version | 3.0.1 | Type | Application |
Update | * | ||
Edition | unix | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:trend_micro:interscan_viruswall |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.3 | 2007-02-08 | CVE-2007-0851 | Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable. |
7.5 | 2005-05-02 | CVE-2005-0533 | Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure. |
10 | 2001-03-12 | CVE-2001-0133 | The web administration interface for Interscan VirusWall 3.6.x and earlier does not use encryption, which could allow remote attackers to obtain the administrator password to sniff the administrator password via the setpasswd.cgi program or other HTTP GET requests that contain base64 encoded usernames and passwords. |
1.2 | 2001-03-12 | CVE-2001-0132 | Interscan VirusWall 3.6.x and earlier follows symbolic links when uninstalling the product, which allows local users to overwrite arbitrary files via a symlink attack. |
4.6 | 2001-01-09 | CVE-2000-1106 | Trend Micro InterScan VirusWall creates an "Intscan" share to the "InterScan" directory with permissions that grant Full Control permissions to the Everyone group, which allows attackers to gain privileges by modifying the VirusWall programs. |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
33038 | Trend Micro Multiple Products UPX Handling Overflow |
14133 | Trend Micro Multiple Anti-Virus Products ARJ Archive Handling Overflow |
6165 | Trend Micro Interscan VirusWall Password Disclosure |
6164 | Trend Micro Interscan VirusWall SymLink File Overwrite |
1668 | Trend Micro InterScan VirusWall Shared Directory Privilege Escalation |
OpenVAS Exploits
id | Description |
---|---|
2005-11-03 | Name : Various dangerous cgi scripts File : nvt/dangerous_cgis.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2007-A-0013 | Trend Micro Antivirus UPX Compressed PE File Buffer Overflow Vulnerability Severity: Category I - VMSKEY: V0013605 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Trend Micro Interscan VirusWall setpasswd.cgi access RuleID : 2219-community - Type : SERVER-WEBAPP - Revision : 18 |
2014-01-10 | Trend Micro Interscan VirusWall setpasswd.cgi access RuleID : 2219 - Type : SERVER-WEBAPP - Revision : 18 |
2014-01-10 | Trend Micro Products Antivirus Library overflow attempt RuleID : 15992 - Type : FILE-OTHER - Revision : 7 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2007-02-21 | Name: The remote Windows host is vulnerable to a buffer overflow attack. File: trendmicro_upx_parsing.nasl - Type: ACT_GATHER_INFO |
2005-02-24 | Name: The remote host is running an application that is affected by a buffer overfl... File: trendmicro_arj_overflow.nasl - Type: ACT_GATHER_INFO |
2003-06-17 | Name: The remote web server may contain some dangerous CGI scripts. File: dangerous_cgis.nasl - Type: ACT_ATTACK |