SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Security)  >   Trend Micro OfficeScan Vendors:   Trend Micro
Trend Micro OfficeScan URL Filtering Buffer Overflow May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1023553
SecurityTracker URL:  http://securitytracker.com/id/1023553
CVE Reference:   CVE-2010-0564   (Links to External Site)
Updated:  Feb 18 2010
Original Entry Date:  Feb 5 2010
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 8.0
Description:   A vulnerability was reported in Trend Micro OfficeScan. A remote user may be able to execute arbitrary code on the target system.

A remote user can send a specially crafted URL to trigger a buffer overflow in the Trend Micro URL Filtering Engine (TMUFE) and cause the service to stop operating.

[Editor's note: The report indicated the vulnerability is a buffer overflow but did not indicate whether code execution was possible or not.]

Impact:   A remote user can cause denial of service conditions and may be able to execute arbitrary code on the target system.
Solution:   The vendor has issued a fix (8.0 Service Pack 1, Patch 5 - Build 3510).

The vendor's advisory is available at:

http://www.trendmicro.com/ftp/documentation/readme/OSCE_80_Win_SP1_Patch_5_en_readme.txt

Vendor URL:  www.trendmicro.com/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC