Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> OfficeScan configuration file disclosure


Vulnerability Assessment Details

OfficeScan configuration file disclosure

Vulnerability Assessment Summary
Searches for the existence of /officescan/hotdownload/ofscan.ini

Detailed Explanation for this Vulnerability Assessment

Trend Micro OfficeScan Corporate Edition (Japanese version: Virus
Buster Corporate Edition) web-based management console let anybody
access /officescan/hotdownload without authentication.

Reading the configuration file /officescan/hotdownload/ofcscan.ini
will reveal information on your system. More, it contains passwords
that are encrypted by a weak specific algorithm
so they might be
decrypted

Solution : upgrade OfficeScan
Network Security Threat Level: Low

Networks Security ID: 3438

Vulnerability Assessment Copyright: This script is Copyright (C) 2002 Michel Arboi

Cables, Connectors

(LOT of 21) Finisar FTRJ-8519-7N-2.5 SFP Mini-GBIC Transceiver Modules
$60.91
(LOT of 21) Finisar FTRJ-8519-7N-2.5 SFP Mini-GBIC Transceiver Modules picture779793-B21 HP Ethernet 10Gb 2-port 546SFP+ Adapter 790314-001 779791-001
$149.0
779793-B21 HP Ethernet 10Gb 2-port 546SFP+ Adapter 790314-001 779791-001 pictureD-Link DXS-3350SR 48-Port Ethernet w/ 4 SFP Ports Gigabit Managed Layer 3 Switch
$50.0
D-Link DXS-3350SR 48-Port Ethernet w/ 4 SFP Ports Gigabit Managed Layer 3 Switch pictureDell PowerConnect 8132F 24 Port 10Gb SFP+ Dual AC Switch 90 days warranty
$800.0
Dell PowerConnect 8132F 24 Port 10Gb SFP+ Dual AC Switch 90 days warranty picture


Discussions

No Discussions have been posted on this vulnerability.