ID CVE-2006-6179
Summary Buffer overflow in PCCSRV\Web_console\RemoteInstallCGI\CgiRemoteInstall.exe for Trend Micro OfficeScan 7.3 before build 7.3.0.1089 allows remote attackers to execute arbitrary code via unknown attack vectors.
References
Vulnerable Configurations
  • cpe:2.3:a:trend_micro:officescan:7.3
    cpe:2.3:a:trend_micro:officescan:7.3
CVSS
Base: 7.5 (as of 30-11-2006 - 23:16)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
NASL family CGI abuses
NASL id TRENDMICRO_OFFICESCAN_MULTIPLE.NASL
description The remote host appears to be running Trend Micro OfficeScan Server. This version of OfficeScan is vulnerable to multiple stack overflows in CGI programs that could allow a remote attacker to execute code in the context of the remote server. Note that OfficeScan server under Windows runs with SYSTEM privileges, which means an attacker can gain complete control of the affected host. In addition, there is a format string vulnerability in the 'ATXCONSOLE.OCX' ActiveX Control that could allow for remote code execution via malicious input to the console's Remote Client Install name search as well as flaws that might allow for removal of the OfficeScan client or arbitrary files from the remote host.
last seen 2019-02-21
modified 2018-08-01
plugin id 22048
published 2006-07-14
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=22048
title Trend Micro OfficeScan 7.3 Multiple Vulnerabilities
refmap via4
bid 21442
confirm http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1031753
misc http://solutionfile.trendmicro.com/SolutionFile/1031753/en/Hotfix_Readme_OSCE7_3_B1089.txt
vupen ADV-2006-4852
Last major update 07-03-2011 - 21:45
Published 30-11-2006 - 18:28
Back to Top