Trend Micro Products SSAPI Module Long Path Processing Buffer Overflow

ERCOLINO

Membro dello Staff
Amministratore
Registrato
3 Marzo 2003
Messaggi
252.665
Località
Torino
Secunia Advisory: SA26557
Release Date: 2007-08-22

Critical: Moderately critical
Impact: Privilege escalation
System access
Where: From local network
Solution Status: Vendor Workaround

Software: Trend Micro Anti-Spyware 3.x
Trend Micro PC-cillin Internet Security 2007

CVE reference: CVE-2007-3873 (Secunia mirror)




Description:
A vulnerability has been reported in Trend Micro products, which can be exploited by malicious, local users to gain escalated privileges or potentially by malicious people to compromise a user's system.

The vulnerability is caused due to a boundary error within the SSAPI module in vstlib32.dll when processing path names. This can be exploited to cause a stack-based buffer overflow by e.g. creating a file with an overly long path name.

Successful exploitation allows execution of arbitrary code with SYSTEM privileges, but requires that the Venus Spy Trap (VST) functionality of SSAPI is enabled.

The vulnerability affects the following products:
* Trend Micro PC-cillin Internet Security 2007 15.0 - SSAPI version 5.0.0.1066
* Trend Micro PC-cillin Internet Security 2007 15.2 – SSAPI v5.0.0.1074
* Trend Micro PC-cillin Internet Security 2007 15.3 – SSAPI v5.2.0.1004
* Trend Micro PC-cillin Internet Security 2007 15.2 Patch – SSAPI v5.2.0.1012
* Trend Micro AntiSpyware 3.5 - SSAPI v5.0.0.1066

Solution:
Apply temporary hotfix until official patches are released, which will reportedly be available via the Trend Micro ActiveUpdate servers on September 10, 2007.


Trend Micro PC-cillin Internet Security 2007:
ftp://conftpuser:consumer-trend@ftp-d...c_2007_1530_win_en_ssapi_5_2_1028.exe


Bollettino Secunia
 
Indietro
Alto Basso