Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Security)  >   Trend Micro OfficeScan Vendors:   Trend Micro
Trend Micro OfficeScan Multiple Flaws Let Remote Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1039500
SecurityTracker URL:
CVE Reference:   CVE-2017-14083, CVE-2017-14084, CVE-2017-14085, CVE-2017-14086, CVE-2017-14087, CVE-2017-14088, CVE-2017-14089   (Links to External Site)
Date:  Oct 4 2017
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 11.0, XG (12.0)
Description:   Multiple vulnerabilities were reported in Trend Micro OfficeScan. A remote user can execute arbitrary code on the target system.

A remote user can start a remote process.

A remote user can obtain potentially sensitive information.

A remote user can inject Host header data.

A remote user can bypass access controls.

A remote user that can conduct a man-in-the-middle attack can execute arbitrary code.

A remote authenticated user can trigger a memory corruption error to gain elevated privileges on the target system.

zer0b4by (via Trend Micro's Zero Day Initiative), John Page (aka hyp3rlinx) of ApparitionSec, and Leong Wai Meng reported these vulnerabilities.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix (11.0 SP1 CP 6426, XG (12.0) CP 1708).

The vendor advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Not specified
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC