HTTP: Trend Micro OfficeScan Atxconsole ActiveX Control Format String Vulnerability

This signature detects attempts to exploit a known format string vulnerability in Trend Micro OfficeScan. It is due to a format string flaw in the Atxconsole ActiveX control, which allows for a buffer overflow and a potential diversion of the code execution flow. A remote attacker may exploit the vulnerability by enticing the target user to open a malicious HTML page, resulting in the execution of arbitrary code on the vulnerable host in the security context of the target browser. In an attack case where code injection is not successful, the browser which loads the ActiveX object will terminate abnormally. In a more sophisticated attack attempt which results in successful code injection, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user account.

Extended Description

Trend Micro OfficeScan is prone to a remote format-string vulnerability. This vulnerability requires a certain amount of user-interaction for an attack to occur, such as visiting a malicious website. A successful exploit would let a remote attacker execute code with the privileges of the currently logged-in user. Trend Micro OfficeScan Corporate Edition 7.3 is reported vulnerable. Other versions may be affected as well.

References

BugTraq: 20284

Short Name
HTTP:TRENDMICRO-FMT-STR
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
ActiveX Atxconsole Control Format Micro OfficeScan String Trend Vulnerability bid:20284
Release Date
07/26/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
False Positive
Unknown

Found a potential security threat?