APP: Trend Micro OfficeScan Console Authentication Buffer Overflow

This signature detects attempts to exploit a known buffer overflow vulnerability in the way Trend Micro OfficeScan management console handles HTTP requests. It is due to lack of boundary protection while processing HTTP cookie strings. Remote unauthenticated attackers can exploit this to take complete control of an affected system. In an unsuccessful attack, the affected application suspends abnormally. The attacker might consume all the system resource by sending continuous requests and create a denial-of-service condition to the affected server. In a successful code injection attack, the behavior of the target is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the affected service.

Extended Description

Trend Micro OfficeScan Server is prone to a stack buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. Successful exploits may allow an attacker to execute arbitrary code with privileges of the IIS webserver. This may facilitate a complete compromise of vulnerable servers. Failed exploit attempts will likely result in denial-of-service conditions. Versions prior to Trend Micro OfficeScan 8.0 patch build 1042 are confirmed affected by this issue. Client Server Messaging Security for SMB 3.0, 3.5, and 3.6 are also vulnerable. The authentication-bypass issue previously reported in this document has been assigned its own BID: 24935 Trend Micro OfficeScan Management Console Authentication Bypass Vulnerability.

Affected Products

Trend_micro officescan_corporate_edition_for_smb2.0

References

BugTraq: 24641

CVE: CVE-2007-3454

Short Name
APP:TMIC:OFFICESCAN-AUTH
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
Authentication Buffer CVE-2007-3454 Console Micro OfficeScan Overflow Trend bid:24641
Release Date
10/12/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
Port
TCP/4343
False Positive
Unknown
Vendors

Trend_micro

CVSS Score

10.0

Found a potential security threat?