HTTP: Trend Micro OfficeScan Multiple CGI Modules HTTP Form Processing Buffer Overflow

This signature detects attempts to exploit a known buffer overflow vulnerability in Trend Micro's OfficeScan. It is due to a boundary error when handling HTTP requests. An unauthenticated remote attacker can leverage this to inject and execute arbitrary code with System level privileges on the target system. In a successful code injection and execution attack, the behavior of the target is entirely dependent on the intended function of the injected code. If the code execution is not achieved, the CGI process initiated for the session terminates abnormally.

Extended Description

Trend Micro OfficeScan is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. Successful exploits may allow an attacker to execute arbitrary code within the context of the affected application. This may facilitate a complete compromise of vulnerable computers. Failed exploit attempts will likely result in denial-of-service conditions. This issue affects OfficeScan 7.3 with Patch 4 build 1362 and OfficeScan 8.0 SP1 Patch 1; other versions may also be affected.

Affected Products

Trend_micro officescan

References

BugTraq: 31859

CVE: CVE-2008-3862

Short Name
HTTP:CGI:OFFICESCAN-CGI-BO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CGI CVE-2008-3862 Form HTTP Micro Modules Multiple OfficeScan Overflow Processing Trend bid:31859
Release Date
10/18/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3700
False Positive
Unknown
Vendors

Trend_micro

CVSS Score

10.0

Found a potential security threat?