var-200901-0446
Vulnerability from variot

Multiple heap-based buffer overflows in the ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allow remote attackers to execute arbitrary code via a packet with a small value in an unspecified size field. Successful exploits may allow an attacker to crash an affected application, execute arbitrary code, or bypass security. These issues affect the following: Trend Micro OfficeScan Corporate Edition 8.0 SP1 Patch 1 Trend Micro Internet Security 2008 Trend Micro Internet Security Pro 2008 Trend Micro PC-cillin Internet Security 2007.

3) Missing authentication to the Trend Micro Personal Firewall service (TmPfw.exe) listening on port 40000/TCP by default can be exploited by any local user to manipulate the firewall configuration via specially crafted packets regardless of whether password restriction has been enabled for the configuration interface.

The vulnerabilities are confirmed in versions 16.10.1063 and 16.10.1079. Other versions may also be affected.

ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2008-42/ http://secunia.com/secunia_research/2008-43/

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

.

====================================================================== 2) Severity

Rating: Less critical Impact: Denial of Service Privilege Escalation Where: Local system

====================================================================== 3) Vendor's Description of Software

"Trend Micro Internet Security provides smart, up-to-date protection for your home network against present and future threats without slowing down your PC.". These can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges.

1) Input validation errors exist in the firewall service (TmPfw.exe) within the "ApiThread()" function when processing packets sent to the service (by default port 40000/TCP). These can be exploited to cause heap-based buffer overflows via specially crafted packets containing a small value in a size field.

2) Input validation errors exist in the firewall service (TmPfw.exe) within the "ApiThread()" function when processing packets sent to the service (by default port 40000/TCP). These can be exploited to crash the service via specially crafted packets containing an overly large value in a size field.

====================================================================== 5) Solution

Apply patch for OfficeScan 8.0 SP1 Patch 1.

====================================================================== 6) Time Table

17/10/2008 - Vendor notified. 18/10/2008 - Vendor response. 14/12/2008 - Vendor provides hotfix for testing. 19/12/2008 - Vendor informed that hotfix fixes vulnerabilities. 18/01/2009 - Vendor issues fix for OfficeScan 8.0 SP1 Patch 1. 20/01/2009 - Public disclosure.

====================================================================== 7) Credits

Discovered by Carsten Eiram, Secunia Research.

====================================================================== 8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned the following CVE identifiers:

  • CVE-2008-3864 (DoS via large size value)
  • CVE-2008-3865 (buffer overflow)

Trend Micro: http://www.trendmicro.com/ftp/documentation/readme/ OSCE8.0_SP1_Patch1_CriticalPatch_3191_Readme.txt

====================================================================== 9) About Secunia

Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration:

http://secunia.com/advisories/business_solutions/

Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security.

http://secunia.com/advisories/

Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general:

http://secunia.com/secunia_research/

Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions:

http://secunia.com/corporate/jobs/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/advisories/mailing_lists/

====================================================================== 10) Verification

Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2008-42/

Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/

======================================================================

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200901-0446",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "officescan",
            scope: "eq",
            trust: 1.6,
            vendor: "trend micro",
            version: "8.0",
         },
         {
            model: "internet security 2008",
            scope: "eq",
            trust: 1.6,
            vendor: "trend micro",
            version: "17.0.1224",
         },
         {
            model: "internet security 2007",
            scope: "eq",
            trust: 1,
            vendor: "trend micro",
            version: "*",
         },
         {
            model: "internet security",
            scope: "eq",
            trust: 0.8,
            vendor: "trend micro",
            version: "2007",
         },
         {
            model: "internet security",
            scope: "eq",
            trust: 0.8,
            vendor: "trend micro",
            version: "2008 17.0.1224",
         },
         {
            model: "officescan",
            scope: "eq",
            trust: 0.8,
            vendor: "trend micro",
            version: "8.0 sp1 patch 1",
         },
         {
            model: "internet security 2007",
            scope: null,
            trust: 0.6,
            vendor: "trend micro",
            version: null,
         },
         {
            model: "pc-cillin internet security",
            scope: "eq",
            trust: 0.3,
            vendor: "trend micro",
            version: "2007",
         },
         {
            model: "officescan corporate edition sp1 patch",
            scope: "eq",
            trust: 0.3,
            vendor: "trend micro",
            version: "8.01",
         },
         {
            model: "internet security pro",
            scope: "eq",
            trust: 0.3,
            vendor: "trend micro",
            version: "2008",
         },
         {
            model: "internet security",
            scope: "eq",
            trust: 0.3,
            vendor: "trend micro",
            version: "2008",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "33358",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-005297",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200901-236",
         },
         {
            db: "NVD",
            id: "CVE-2008-3865",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:trend_micro:internet_security_2007:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:trend_micro:internet_security_2008:17.0.1224:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:trend_micro:officescan:8.0:sp1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2008-3865",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Carsten Eiram",
      sources: [
         {
            db: "PACKETSTORM",
            id: "74169",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200901-236",
         },
      ],
      trust: 0.7,
   },
   cve: "CVE-2008-3865",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 10,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2008-3865",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 1.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2008-3865",
                  trust: 1.8,
                  value: "High",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200901-236",
                  trust: 0.6,
                  value: "CRITICAL",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-005297",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200901-236",
         },
         {
            db: "NVD",
            id: "CVE-2008-3865",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple heap-based buffer overflows in the ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allow remote attackers to execute arbitrary code via a packet with a small value in an unspecified size field. \nSuccessful exploits may allow an attacker to crash an affected application, execute arbitrary code, or bypass security. \nThese issues affect the following:\nTrend Micro OfficeScan Corporate Edition 8.0 SP1 Patch 1\nTrend Micro Internet Security 2008\nTrend Micro Internet Security Pro 2008\nTrend Micro PC-cillin Internet Security 2007. \n\n3) Missing authentication to the Trend Micro Personal Firewall\nservice (TmPfw.exe) listening on port 40000/TCP by default can be\nexploited by any local user to manipulate the firewall configuration\nvia specially crafted packets regardless of whether password\nrestriction has been enabled for the configuration interface. \n\nThe vulnerabilities are confirmed in versions 16.10.1063 and\n16.10.1079. Other versions may also be affected. \n\nORIGINAL ADVISORY:\nSecunia Research:\nhttp://secunia.com/secunia_research/2008-42/\nhttp://secunia.com/secunia_research/2008-43/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\n====================================================================== \n2) Severity \n\nRating: Less critical\nImpact: Denial of Service\n\tPrivilege Escalation\nWhere:  Local system\n\n====================================================================== \n3) Vendor's Description of Software \n\n\"Trend Micro Internet Security provides smart, up-to-date protection\nfor your home network against present and future threats without\nslowing down your PC.\". \nThese can be exploited by malicious, local users to cause a DoS \n(Denial of Service) or potentially gain escalated privileges. \n\n1) Input validation errors exist in the firewall service (TmPfw.exe) \nwithin the \"ApiThread()\" function when processing packets sent to the \nservice (by default port 40000/TCP). These can be exploited to cause \nheap-based buffer overflows via specially crafted packets containing a\nsmall value in a size field. \n\n2) Input validation errors exist in the firewall service (TmPfw.exe) \nwithin the \"ApiThread()\" function when processing packets sent to the\nservice (by default port 40000/TCP). These can be exploited to crash \nthe service via specially crafted packets containing an overly large \nvalue in a size field. \n\n====================================================================== \n5) Solution \n\nApply patch for OfficeScan 8.0 SP1 Patch 1. \n\n====================================================================== \n6) Time Table \n\n17/10/2008 - Vendor notified. \n18/10/2008 - Vendor response. \n14/12/2008 - Vendor provides hotfix for testing. \n19/12/2008 - Vendor informed that hotfix fixes vulnerabilities. \n18/01/2009 - Vendor issues fix for OfficeScan 8.0 SP1 Patch 1. \n20/01/2009 - Public disclosure. \n\n====================================================================== \n7) Credits \n\nDiscovered by Carsten Eiram, Secunia Research. \n\n====================================================================== \n8) References\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned \nthe following CVE identifiers:\n\n* CVE-2008-3864 (DoS via large size value)\n* CVE-2008-3865 (buffer overflow)\n\nTrend Micro:\nhttp://www.trendmicro.com/ftp/documentation/readme/\nOSCE8.0_SP1_Patch1_CriticalPatch_3191_Readme.txt\n\n====================================================================== \n9) About Secunia\n\nSecunia offers vulnerability management solutions to corporate\ncustomers with verified and reliable vulnerability intelligence\nrelevant to their specific system configuration:\n\nhttp://secunia.com/advisories/business_solutions/\n\nSecunia also provides a publicly accessible and comprehensive advisory\ndatabase as a service to the security community and private \nindividuals, who are interested in or concerned about IT-security. \n\nhttp://secunia.com/advisories/\n\nSecunia believes that it is important to support the community and to\ndo active vulnerability research in order to aid improving the \nsecurity and reliability of software in general:\n\nhttp://secunia.com/secunia_research/\n\nSecunia regularly hires new skilled team members. Check the URL below\nto see currently vacant positions:\n\nhttp://secunia.com/corporate/jobs/\n\nSecunia offers a FREE mailing list called Secunia Security Advisories:\n\nhttp://secunia.com/advisories/mailing_lists/\n\n====================================================================== \n10) Verification \n\nPlease verify this advisory by visiting the Secunia website:\nhttp://secunia.com/secunia_research/2008-42/\n\nComplete list of vulnerability reports published by Secunia Research:\nhttp://secunia.com/secunia_research/\n\n======================================================================\n",
      sources: [
         {
            db: "NVD",
            id: "CVE-2008-3865",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-005297",
         },
         {
            db: "BID",
            id: "33358",
         },
         {
            db: "PACKETSTORM",
            id: "74111",
         },
         {
            db: "PACKETSTORM",
            id: "74169",
         },
         {
            db: "PACKETSTORM",
            id: "74109",
         },
      ],
      trust: 2.16,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2008-3865",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "33358",
            trust: 1.9,
         },
         {
            db: "SECUNIA",
            id: "31160",
            trust: 1.7,
         },
         {
            db: "SECUNIA",
            id: "33609",
            trust: 1.7,
         },
         {
            db: "SECTRACK",
            id: "1021614",
            trust: 1.6,
         },
         {
            db: "SECTRACK",
            id: "1021615",
            trust: 1.6,
         },
         {
            db: "SREASON",
            id: "4937",
            trust: 1.6,
         },
         {
            db: "VUPEN",
            id: "ADV-2009-0191",
            trust: 1.6,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-005297",
            trust: 0.8,
         },
         {
            db: "XF",
            id: "48107",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20090120 SECUNIA RESEARCH: TREND MICRO NETWORK SECURITY COMPONENT VULNERABILITIES",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200901-236",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "74111",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "74169",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "74109",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "BID",
            id: "33358",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-005297",
         },
         {
            db: "PACKETSTORM",
            id: "74111",
         },
         {
            db: "PACKETSTORM",
            id: "74169",
         },
         {
            db: "PACKETSTORM",
            id: "74109",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200901-236",
         },
         {
            db: "NVD",
            id: "CVE-2008-3865",
         },
      ],
   },
   id: "VAR-200901-0446",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 1,
   },
   last_update_date: "2022-05-04T09:31:05.129000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Critical Patch - Server Build 3191 and NSC module Build 1045",
            trust: 0.8,
            url: "http://www.trendmicro.com/ftp/documentation/readme/osce8.0_sp1_patch1_criticalpatch_3191_readme.txt",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-005297",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-005297",
         },
         {
            db: "NVD",
            id: "CVE-2008-3865",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.2,
            url: "http://secunia.com/secunia_research/2008-42/",
         },
         {
            trust: 2,
            url: "http://www.trendmicro.com/ftp/documentation/readme/osce8.0_sp1_patch1_criticalpatch_3191_readme.txt",
         },
         {
            trust: 1.6,
            url: "http://www.securityfocus.com/bid/33358",
         },
         {
            trust: 1.6,
            url: "http://www.securitytracker.com/id?1021615",
         },
         {
            trust: 1.6,
            url: "http://www.securitytracker.com/id?1021614",
         },
         {
            trust: 1.6,
            url: "http://securityreason.com/securityalert/4937",
         },
         {
            trust: 1.6,
            url: "http://secunia.com/advisories/33609",
         },
         {
            trust: 1.6,
            url: "http://secunia.com/advisories/31160",
         },
         {
            trust: 1,
            url: "http://www.vupen.com/english/advisories/2009/0191",
         },
         {
            trust: 1,
            url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/48107",
         },
         {
            trust: 1,
            url: "http://www.securityfocus.com/archive/1/500195/100/0/threaded",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3865",
         },
         {
            trust: 0.8,
            url: "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3865",
         },
         {
            trust: 0.6,
            url: "http://xforce.iss.net/xforce/xfdb/48107",
         },
         {
            trust: 0.6,
            url: "http://www.securityfocus.com/archive/1/archive/1/500195/100/0/threaded",
         },
         {
            trust: 0.6,
            url: "http://www.frsirt.com/english/advisories/2009/0191",
         },
         {
            trust: 0.5,
            url: "http://secunia.com/secunia_research/2008-43/",
         },
         {
            trust: 0.3,
            url: "http://uk.trendmicro-europe.com/enterprise/products/groups.php?prodgroup=3&family=5",
         },
         {
            trust: 0.3,
            url: "/archive/1/500195",
         },
         {
            trust: 0.3,
            url: "http://secunia.com/advisories/business_solutions/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/advisories/secunia_security_advisories/",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.2,
            url: "http://secunia.com/advisories/about_secunia_advisories/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/16916/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/16915/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/13436/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/31160/",
         },
         {
            trust: 0.1,
            url: "http://www.trendmicro.com/ftp/documentation/readme/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/secunia_research/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/corporate/jobs/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/mailing_lists/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2008-3865",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2008-3864",
         },
         {
            trust: 0.1,
            url: "http://us.trendmicro.com/us/products/personal/internet-security/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/product/14630/",
         },
         {
            trust: 0.1,
            url: "http://www.trendmicro.com/ftp/products/patches/osce_8.0_sp1_patch1_win_en_criticalpatch_b3191.exe",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/33609/",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "33358",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-005297",
         },
         {
            db: "PACKETSTORM",
            id: "74111",
         },
         {
            db: "PACKETSTORM",
            id: "74169",
         },
         {
            db: "PACKETSTORM",
            id: "74109",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200901-236",
         },
         {
            db: "NVD",
            id: "CVE-2008-3865",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "BID",
            id: "33358",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2009-005297",
         },
         {
            db: "PACKETSTORM",
            id: "74111",
         },
         {
            db: "PACKETSTORM",
            id: "74169",
         },
         {
            db: "PACKETSTORM",
            id: "74109",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200901-236",
         },
         {
            db: "NVD",
            id: "CVE-2008-3865",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2009-01-20T00:00:00",
            db: "BID",
            id: "33358",
         },
         {
            date: "2012-12-20T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2009-005297",
         },
         {
            date: "2009-01-20T15:48:37",
            db: "PACKETSTORM",
            id: "74111",
         },
         {
            date: "2009-01-21T02:19:03",
            db: "PACKETSTORM",
            id: "74169",
         },
         {
            date: "2009-01-20T15:48:31",
            db: "PACKETSTORM",
            id: "74109",
         },
         {
            date: "2009-01-21T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200901-236",
         },
         {
            date: "2009-01-21T20:30:00",
            db: "NVD",
            id: "CVE-2008-3865",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2009-02-06T16:18:00",
            db: "BID",
            id: "33358",
         },
         {
            date: "2012-12-20T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2009-005297",
         },
         {
            date: "2022-03-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200901-236",
         },
         {
            date: "2018-10-11T20:50:00",
            db: "NVD",
            id: "CVE-2008-3865",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200901-236",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Trend Micro NSC Module firewall heap-based buffer overflow vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-005297",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200901-236",
         },
      ],
      trust: 0.6,
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.