Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks if vulnerable version Trend Micro Office scan is installed
Detailed Explanation for this Vulnerability Assessment
The remote Windows host is affected by a remote buffer overflow
The remote host is running Trend Micro Antivirus, a commercial
anti-virus software package for Windows. The remote version of the
installed antivirus is vulnerable to a remote buffer overflow
vulnerability. The issue exists due a vulnerability in the ActiveX
control installed by the OfficeScan server during a web install of the
OfficeScan clients. The clients cache this ActiveX control which can
be exploited by a malicious website. The attacker can trigger this
issue by enticing a user to click on a malicious link or sending the
the link in an email and urging the user to click on it. Successful
exploitation of this issue might result in arbitrary code execution.
Apply the security patch released by the vendor.
Network Security Threat Level:
High / CVSS Base Score : 8.0
Networks Security ID: 22585
Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security, Inc
|Dell R720 8-Core Server 2x E5-2609 v2 2.5GHz 16GB 8x 480GB SSD H710 2.5in Rails
|DELL POWEREDGE R710 TWO E5520 2.26GHZ 128GB 6 X 600GB 10K SAS PERC 6/I
|Dell R720 8-Core Server 2x E5-2609 v2 2.5GHz 128GB 16x 600GB H710P 2.5in 16 Bay
|DELL POWEREDGE M620 BLADE TWO E5-2660V2 2.20GHZ 96GB 2 X 300GB 10K SAS H310
No Discussions have been posted on this vulnerability.