Trend Micro Products UPX Processing Buffer Overflow Vulnerability

ERCOLINO

Membro dello Staff
Amministratore
Registrato
3 Marzo 2003
Messaggi
252.454
Località
Torino
Secunia Advisory: SA24087
Release Date: 2007-02-08

Critical: Highly critical
Impact: DoS
System access
Where: From remote
Solution Status: Vendor Patch

Software: Trend Micro Client Server Messaging Security for SMB 3.x
Trend Micro Client Server Security for SMB 3.x
Trend Micro Control Manager (TMCM) 3.x
Trend Micro InterScan AppletTrap 2.x
Trend Micro InterScan eManager 3.x
Trend Micro InterScan Messaging Security Suite 5.x
Trend Micro InterScan VirusWall 3.x
Trend Micro InterScan Web Security Suite 1.x
Trend Micro InterScan Web Security Suite 2.x
Trend Micro InterScan WebManager 2.x
Trend Micro InterScan WebProtect for ISA 3.x
Trend Micro OfficeScan Corporate Edition 3.x
Trend Micro OfficeScan Corporate Edition 5.x
Trend Micro OfficeScan Corporate Edition 6.x
Trend Micro OfficeScan Corporate Edition 7.x
Trend Micro PC-cillin 2000
Trend Micro PC-cillin 2002
Trend Micro PC-cillin 2003
Trend Micro PC-cillin Internet Security 2005
Trend Micro PC-cillin Internet Security 2006 / 14.x
Trend Micro PC-cillin Internet Security 2007
Trend Micro PortalProtect for SharePoint 1.x
Trend Micro ScanMail eManager 3.x
Trend Micro ScanMail eManager 5.x
Trend Micro ScanMail for Lotus Notes 2.x
Trend Micro ScanMail for Lotus Notes 3.x
Trend Micro ScanMail for Microsoft Exchange 3.x
Trend Micro ScanMail for Microsoft Exchange 6.x
Trend Micro ScanMail for Microsoft Exchange 7.x
Trend Micro ScanMail for Openmail 2.x
Trend Micro ServerProtect for Linux 1.x
Trend Micro ServerProtect for Windows/NetWare 5.x




Description:
A vulnerability has been reported in Trend Micro products, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

The vulnerability is caused due to an error within the processing of UPX compressed executables. This can be exploited to cause a buffer overflow when scanning a specially crafted UPX compressed executable file.

Successful exploitation may allow execution of arbitrary code or cause the system to crash.

The vulnerability reportedly affects all Trend Micro products and versions that use the Scan Engine and Pattern File technology.

Solution:
Update the virus pattern file to 4.245.00 or higher.


Bollettino di Sicurezza


Il problema è già stato risolto in modo veloce due giorni fa ,ora siamo al pattern 4.257.00 ;) :D
 
Indietro
Alto Basso