var-200901-0446
Vulnerability from variot
Multiple heap-based buffer overflows in the ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allow remote attackers to execute arbitrary code via a packet with a small value in an unspecified size field. Successful exploits may allow an attacker to crash an affected application, execute arbitrary code, or bypass security. These issues affect the following: Trend Micro OfficeScan Corporate Edition 8.0 SP1 Patch 1 Trend Micro Internet Security 2008 Trend Micro Internet Security Pro 2008 Trend Micro PC-cillin Internet Security 2007.
3) Missing authentication to the Trend Micro Personal Firewall service (TmPfw.exe) listening on port 40000/TCP by default can be exploited by any local user to manipulate the firewall configuration via specially crafted packets regardless of whether password restriction has been enabled for the configuration interface.
The vulnerabilities are confirmed in versions 16.10.1063 and 16.10.1079. Other versions may also be affected.
ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2008-42/ http://secunia.com/secunia_research/2008-43/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
====================================================================== 2) Severity
Rating: Less critical Impact: Denial of Service Privilege Escalation Where: Local system
====================================================================== 3) Vendor's Description of Software
"Trend Micro Internet Security provides smart, up-to-date protection for your home network against present and future threats without slowing down your PC.". These can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges.
1) Input validation errors exist in the firewall service (TmPfw.exe) within the "ApiThread()" function when processing packets sent to the service (by default port 40000/TCP). These can be exploited to cause heap-based buffer overflows via specially crafted packets containing a small value in a size field.
2) Input validation errors exist in the firewall service (TmPfw.exe) within the "ApiThread()" function when processing packets sent to the service (by default port 40000/TCP). These can be exploited to crash the service via specially crafted packets containing an overly large value in a size field.
====================================================================== 5) Solution
Apply patch for OfficeScan 8.0 SP1 Patch 1.
====================================================================== 6) Time Table
17/10/2008 - Vendor notified. 18/10/2008 - Vendor response. 14/12/2008 - Vendor provides hotfix for testing. 19/12/2008 - Vendor informed that hotfix fixes vulnerabilities. 18/01/2009 - Vendor issues fix for OfficeScan 8.0 SP1 Patch 1. 20/01/2009 - Public disclosure.
====================================================================== 7) Credits
Discovered by Carsten Eiram, Secunia Research.
====================================================================== 8) References
The Common Vulnerabilities and Exposures (CVE) project has assigned the following CVE identifiers:
- CVE-2008-3864 (DoS via large size value)
- CVE-2008-3865 (buffer overflow)
Trend Micro: http://www.trendmicro.com/ftp/documentation/readme/ OSCE8.0_SP1_Patch1_CriticalPatch_3191_Readme.txt
====================================================================== 9) About Secunia
Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration:
http://secunia.com/advisories/business_solutions/
Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security.
http://secunia.com/advisories/
Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general:
http://secunia.com/secunia_research/
Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions:
http://secunia.com/corporate/jobs/
Secunia offers a FREE mailing list called Secunia Security Advisories:
http://secunia.com/advisories/mailing_lists/
====================================================================== 10) Verification
Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2008-42/
Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/
======================================================================
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-200901-0446", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "officescan", scope: "eq", trust: 1.6, vendor: "trend micro", version: "8.0", }, { model: "internet security 2008", scope: "eq", trust: 1.6, vendor: "trend micro", version: "17.0.1224", }, { model: "internet security 2007", scope: "eq", trust: 1, vendor: "trend micro", version: "*", }, { model: "internet security", scope: "eq", trust: 0.8, vendor: "trend micro", version: "2007", }, { model: "internet security", scope: "eq", trust: 0.8, vendor: "trend micro", version: "2008 17.0.1224", }, { model: "officescan", scope: "eq", trust: 0.8, vendor: "trend micro", version: "8.0 sp1 patch 1", }, { model: "internet security 2007", scope: null, trust: 0.6, vendor: "trend micro", version: null, }, { model: "pc-cillin internet security", scope: "eq", trust: 0.3, vendor: "trend micro", version: "2007", }, { model: "officescan corporate edition sp1 patch", scope: "eq", trust: 0.3, vendor: "trend micro", version: "8.01", }, { model: "internet security pro", scope: "eq", trust: 0.3, vendor: "trend micro", version: "2008", }, { model: "internet security", scope: "eq", trust: 0.3, vendor: "trend micro", version: "2008", }, ], sources: [ { db: "BID", id: "33358", }, { db: "JVNDB", id: "JVNDB-2009-005297", }, { db: "CNNVD", id: "CNNVD-200901-236", }, { db: "NVD", id: "CVE-2008-3865", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trend_micro:internet_security_2007:*:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:trend_micro:internet_security_2008:17.0.1224:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:trend_micro:officescan:8.0:sp1:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2008-3865", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Carsten Eiram", sources: [ { db: "PACKETSTORM", id: "74169", }, { db: "CNNVD", id: "CNNVD-200901-236", }, ], trust: 0.7, }, cve: "CVE-2008-3865", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: null, accessComplexity: "Low", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 10, confidentialityImpact: "Complete", exploitabilityScore: null, id: "CVE-2008-3865", impactScore: null, integrityImpact: "Complete", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "High", trust: 1.8, userInteractionRequired: null, vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, ], cvssV3: [], severity: [ { author: "NVD", id: "CVE-2008-3865", trust: 1.8, value: "High", }, { author: "CNNVD", id: "CNNVD-200901-236", trust: 0.6, value: "CRITICAL", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2009-005297", }, { db: "CNNVD", id: "CNNVD-200901-236", }, { db: "NVD", id: "CVE-2008-3865", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Multiple heap-based buffer overflows in the ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allow remote attackers to execute arbitrary code via a packet with a small value in an unspecified size field. \nSuccessful exploits may allow an attacker to crash an affected application, execute arbitrary code, or bypass security. \nThese issues affect the following:\nTrend Micro OfficeScan Corporate Edition 8.0 SP1 Patch 1\nTrend Micro Internet Security 2008\nTrend Micro Internet Security Pro 2008\nTrend Micro PC-cillin Internet Security 2007. \n\n3) Missing authentication to the Trend Micro Personal Firewall\nservice (TmPfw.exe) listening on port 40000/TCP by default can be\nexploited by any local user to manipulate the firewall configuration\nvia specially crafted packets regardless of whether password\nrestriction has been enabled for the configuration interface. \n\nThe vulnerabilities are confirmed in versions 16.10.1063 and\n16.10.1079. Other versions may also be affected. \n\nORIGINAL ADVISORY:\nSecunia Research:\nhttp://secunia.com/secunia_research/2008-42/\nhttp://secunia.com/secunia_research/2008-43/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\n====================================================================== \n2) Severity \n\nRating: Less critical\nImpact: Denial of Service\n\tPrivilege Escalation\nWhere: Local system\n\n====================================================================== \n3) Vendor's Description of Software \n\n\"Trend Micro Internet Security provides smart, up-to-date protection\nfor your home network against present and future threats without\nslowing down your PC.\". \nThese can be exploited by malicious, local users to cause a DoS \n(Denial of Service) or potentially gain escalated privileges. \n\n1) Input validation errors exist in the firewall service (TmPfw.exe) \nwithin the \"ApiThread()\" function when processing packets sent to the \nservice (by default port 40000/TCP). These can be exploited to cause \nheap-based buffer overflows via specially crafted packets containing a\nsmall value in a size field. \n\n2) Input validation errors exist in the firewall service (TmPfw.exe) \nwithin the \"ApiThread()\" function when processing packets sent to the\nservice (by default port 40000/TCP). These can be exploited to crash \nthe service via specially crafted packets containing an overly large \nvalue in a size field. \n\n====================================================================== \n5) Solution \n\nApply patch for OfficeScan 8.0 SP1 Patch 1. \n\n====================================================================== \n6) Time Table \n\n17/10/2008 - Vendor notified. \n18/10/2008 - Vendor response. \n14/12/2008 - Vendor provides hotfix for testing. \n19/12/2008 - Vendor informed that hotfix fixes vulnerabilities. \n18/01/2009 - Vendor issues fix for OfficeScan 8.0 SP1 Patch 1. \n20/01/2009 - Public disclosure. \n\n====================================================================== \n7) Credits \n\nDiscovered by Carsten Eiram, Secunia Research. \n\n====================================================================== \n8) References\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned \nthe following CVE identifiers:\n\n* CVE-2008-3864 (DoS via large size value)\n* CVE-2008-3865 (buffer overflow)\n\nTrend Micro:\nhttp://www.trendmicro.com/ftp/documentation/readme/\nOSCE8.0_SP1_Patch1_CriticalPatch_3191_Readme.txt\n\n====================================================================== \n9) About Secunia\n\nSecunia offers vulnerability management solutions to corporate\ncustomers with verified and reliable vulnerability intelligence\nrelevant to their specific system configuration:\n\nhttp://secunia.com/advisories/business_solutions/\n\nSecunia also provides a publicly accessible and comprehensive advisory\ndatabase as a service to the security community and private \nindividuals, who are interested in or concerned about IT-security. \n\nhttp://secunia.com/advisories/\n\nSecunia believes that it is important to support the community and to\ndo active vulnerability research in order to aid improving the \nsecurity and reliability of software in general:\n\nhttp://secunia.com/secunia_research/\n\nSecunia regularly hires new skilled team members. Check the URL below\nto see currently vacant positions:\n\nhttp://secunia.com/corporate/jobs/\n\nSecunia offers a FREE mailing list called Secunia Security Advisories:\n\nhttp://secunia.com/advisories/mailing_lists/\n\n====================================================================== \n10) Verification \n\nPlease verify this advisory by visiting the Secunia website:\nhttp://secunia.com/secunia_research/2008-42/\n\nComplete list of vulnerability reports published by Secunia Research:\nhttp://secunia.com/secunia_research/\n\n======================================================================\n", sources: [ { db: "NVD", id: "CVE-2008-3865", }, { db: "JVNDB", id: "JVNDB-2009-005297", }, { db: "BID", id: "33358", }, { db: "PACKETSTORM", id: "74111", }, { db: "PACKETSTORM", id: "74169", }, { db: "PACKETSTORM", id: "74109", }, ], trust: 2.16, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2008-3865", trust: 2.8, }, { db: "BID", id: "33358", trust: 1.9, }, { db: "SECUNIA", id: "31160", trust: 1.7, }, { db: "SECUNIA", id: "33609", trust: 1.7, }, { db: "SECTRACK", id: "1021614", trust: 1.6, }, { db: "SECTRACK", id: "1021615", trust: 1.6, }, { db: "SREASON", id: "4937", trust: 1.6, }, { db: "VUPEN", id: "ADV-2009-0191", trust: 1.6, }, { db: "JVNDB", id: "JVNDB-2009-005297", trust: 0.8, }, { db: "XF", id: "48107", trust: 0.6, }, { db: "BUGTRAQ", id: "20090120 SECUNIA RESEARCH: TREND MICRO NETWORK SECURITY COMPONENT VULNERABILITIES", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-200901-236", trust: 0.6, }, { db: "PACKETSTORM", id: "74111", trust: 0.1, }, { db: "PACKETSTORM", id: "74169", trust: 0.1, }, { db: "PACKETSTORM", id: "74109", trust: 0.1, }, ], sources: [ { db: "BID", id: "33358", }, { db: "JVNDB", id: "JVNDB-2009-005297", }, { db: "PACKETSTORM", id: "74111", }, { db: "PACKETSTORM", id: "74169", }, { db: "PACKETSTORM", id: "74109", }, { db: "CNNVD", id: "CNNVD-200901-236", }, { db: "NVD", id: "CVE-2008-3865", }, ], }, id: "VAR-200901-0446", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 1, }, last_update_date: "2022-05-04T09:31:05.129000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "Critical Patch - Server Build 3191 and NSC module Build 1045", trust: 0.8, url: "http://www.trendmicro.com/ftp/documentation/readme/osce8.0_sp1_patch1_criticalpatch_3191_readme.txt", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2009-005297", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-119", trust: 1.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2009-005297", }, { db: "NVD", id: "CVE-2008-3865", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 2.2, url: "http://secunia.com/secunia_research/2008-42/", }, { trust: 2, url: "http://www.trendmicro.com/ftp/documentation/readme/osce8.0_sp1_patch1_criticalpatch_3191_readme.txt", }, { trust: 1.6, url: "http://www.securityfocus.com/bid/33358", }, { trust: 1.6, url: "http://www.securitytracker.com/id?1021615", }, { trust: 1.6, url: "http://www.securitytracker.com/id?1021614", }, { trust: 1.6, url: "http://securityreason.com/securityalert/4937", }, { trust: 1.6, url: "http://secunia.com/advisories/33609", }, { trust: 1.6, url: "http://secunia.com/advisories/31160", }, { trust: 1, url: "http://www.vupen.com/english/advisories/2009/0191", }, { trust: 1, url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/48107", }, { trust: 1, url: "http://www.securityfocus.com/archive/1/500195/100/0/threaded", }, { trust: 0.8, url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3865", }, { trust: 0.8, url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3865", }, { trust: 0.6, url: "http://xforce.iss.net/xforce/xfdb/48107", }, { trust: 0.6, url: "http://www.securityfocus.com/archive/1/archive/1/500195/100/0/threaded", }, { trust: 0.6, url: "http://www.frsirt.com/english/advisories/2009/0191", }, { trust: 0.5, url: "http://secunia.com/secunia_research/2008-43/", }, { trust: 0.3, url: "http://uk.trendmicro-europe.com/enterprise/products/groups.php?prodgroup=3&family=5", }, { trust: 0.3, url: "/archive/1/500195", }, { trust: 0.3, url: "http://secunia.com/advisories/business_solutions/", }, { trust: 0.2, url: "http://secunia.com/advisories/secunia_security_advisories/", }, { trust: 0.2, url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org", }, { trust: 0.2, url: "http://secunia.com/advisories/about_secunia_advisories/", }, { trust: 0.1, url: "http://secunia.com/advisories/product/16916/", }, { trust: 0.1, url: "http://secunia.com/advisories/product/16915/", }, { trust: 0.1, url: "http://secunia.com/advisories/product/13436/", }, { trust: 0.1, url: "http://secunia.com/advisories/31160/", }, { trust: 0.1, url: "http://www.trendmicro.com/ftp/documentation/readme/", }, { trust: 0.1, url: "http://secunia.com/secunia_research/", }, { trust: 0.1, url: "http://secunia.com/corporate/jobs/", }, { trust: 0.1, url: "http://secunia.com/advisories/mailing_lists/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2008-3865", }, { trust: 0.1, url: "http://secunia.com/advisories/", }, { trust: 0.1, url: "https://nvd.nist.gov/vuln/detail/cve-2008-3864", }, { trust: 0.1, url: "http://us.trendmicro.com/us/products/personal/internet-security/", }, { trust: 0.1, url: "http://secunia.com/advisories/product/14630/", }, { trust: 0.1, url: "http://www.trendmicro.com/ftp/products/patches/osce_8.0_sp1_patch1_win_en_criticalpatch_b3191.exe", }, { trust: 0.1, url: "http://secunia.com/advisories/33609/", }, ], sources: [ { db: "BID", id: "33358", }, { db: "JVNDB", id: "JVNDB-2009-005297", }, { db: "PACKETSTORM", id: "74111", }, { db: "PACKETSTORM", id: "74169", }, { db: "PACKETSTORM", id: "74109", }, { db: "CNNVD", id: "CNNVD-200901-236", }, { db: "NVD", id: "CVE-2008-3865", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "BID", id: "33358", }, { db: "JVNDB", id: "JVNDB-2009-005297", }, { db: "PACKETSTORM", id: "74111", }, { db: "PACKETSTORM", id: "74169", }, { db: "PACKETSTORM", id: "74109", }, { db: "CNNVD", id: "CNNVD-200901-236", }, { db: "NVD", id: "CVE-2008-3865", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2009-01-20T00:00:00", db: "BID", id: "33358", }, { date: "2012-12-20T00:00:00", db: "JVNDB", id: "JVNDB-2009-005297", }, { date: "2009-01-20T15:48:37", db: "PACKETSTORM", id: "74111", }, { date: "2009-01-21T02:19:03", db: "PACKETSTORM", id: "74169", }, { date: "2009-01-20T15:48:31", db: "PACKETSTORM", id: "74109", }, { date: "2009-01-21T00:00:00", db: "CNNVD", id: "CNNVD-200901-236", }, { date: "2009-01-21T20:30:00", db: "NVD", id: "CVE-2008-3865", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2009-02-06T16:18:00", db: "BID", id: "33358", }, { date: "2012-12-20T00:00:00", db: "JVNDB", id: "JVNDB-2009-005297", }, { date: "2022-03-10T00:00:00", db: "CNNVD", id: "CNNVD-200901-236", }, { date: "2018-10-11T20:50:00", db: "NVD", id: "CVE-2008-3865", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote", sources: [ { db: "CNNVD", id: "CNNVD-200901-236", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Trend Micro NSC Module firewall heap-based buffer overflow vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2009-005297", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-200901-236", }, ], trust: 0.6, }, }
Log in or create an account to share your comment.
This schema specifies the format of a comment related to a security advisory.
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.