HTTP: Trend Micro OfficeScan Server cgiRecvFile Buffer Overflow

This signature detects attempts to exploit a known buffer overflow vulnerability in Trend Micro's OfficeScan. It is due to a boundary error when handling HTTP requests. An unauthenticated remote attacker can leverage this to inject and execute arbitrary code with System level privileges on the target system. In a successful code injection and execution attack, the behavior of the target is entirely dependent on the intended function of the injected code. In an unsuccessful attack, the CGI process initiated for the session terminates abnormally.

Extended Description

Trend Micro OfficeScan is prone to a buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied data before copying it into an insufficiently sized memory buffer. Successful exploits may allow an attacker to execute arbitrary code within the context of the affected application. This may facilitate a complete compromise of vulnerable computers. Failed exploit attempts will likely result in denial-of-service conditions. This issue affects the following: OfficeScan 7.3 with Patch 4 build 1362 OfficeScan 7.0 OfficeScan 8.0 Client Server Messaging Security versions 3.6, 3.5, 3.0, and 2.0

Affected Products

Trend_micro officescan

Short Name
HTTP:OFFICESCAN-CGIRECVFILE
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2008-2437 Micro OfficeScan Overflow Server Trend bid:31139 cgiRecvFile
Release Date
10/13/2010
Supported Platforms

srx-branch-19.3

vsrx3bsd-19.2

srx-19.4

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

vsrx-19.2

srx-19.3

srx-branch-12.3

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx-12.3

vmx-19.3

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Trend_micro

CVSS Score

10.0

Found a potential security threat?