Security-Alerts mailing list archive (security-alerts@yandex-team.ru)
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[security-alerts] FW: [SA24087] Trend Micro Products UPX Processing Buffer Overflow Vulnerability
В развитие темы - удобно для тех, кто будет обновлять
> ----------------------------------------------------------------------
>
> TITLE:
> Trend Micro Products UPX Processing Buffer Overflow Vulnerability
>
> SECUNIA ADVISORY ID:
> SA24087
>
> VERIFY ADVISORY:
>
>
> CRITICAL:
> Highly critical
>
> IMPACT:
> DoS, System access
>
> WHERE:
> From remote
>
> SOFTWARE:
> Trend Micro ServerProtect for Windows/NetWare 5.x
>
> Trend Micro ServerProtect for Linux 1.x
>
> Trend Micro ScanMail for Openmail 2.x
>
> Trend Micro ScanMail for Microsoft Exchange 7.x
>
> Trend Micro ScanMail for Microsoft Exchange 6.x
>
> Trend Micro ScanMail for Microsoft Exchange 3.x
>
> Trend Micro ScanMail for Lotus Notes 3.x
>
> Trend Micro ScanMail for Lotus Notes 2.x
>
> Trend Micro ScanMail eManager 5.x
>
> Trend Micro ScanMail eManager 3.x
>
> Trend Micro PortalProtect for SharePoint 1.x
>
> Trend Micro PC-cillin Internet Security 2007
>
> Trend Micro PC-cillin Internet Security 2006 / 14.x
>
> Trend Micro PC-cillin Internet Security 2005
>
> Trend Micro PC-cillin 2003
>
> Trend Micro PC-cillin 2002
>
> Trend Micro PC-cillin 2000
>
> Trend Micro OfficeScan Corporate Edition 7.x
>
> Trend Micro OfficeScan Corporate Edition 6.x
>
> Trend Micro OfficeScan Corporate Edition 5.x
>
> Trend Micro OfficeScan Corporate Edition 3.x
>
> Trend Micro InterScan WebProtect for ISA 3.x
>
> Trend Micro InterScan WebManager 2.x
>
> Trend Micro InterScan Web Security Suite 2.x
>
> Trend Micro InterScan Web Security Suite 1.x
>
> Trend Micro InterScan VirusWall 3.x
>
> Trend Micro InterScan Messaging Security Suite 5.x
>
> Trend Micro InterScan eManager 3.x
>
> Trend Micro InterScan AppletTrap 2.x
>
> Trend Micro Control Manager (TMCM) 3.x
>
> Trend Micro Client Server Messaging Security for SMB 3.x
>
> Trend Micro Client Server Security for SMB 3.x
>
>
> DESCRIPTION:
> A vulnerability has been reported in Trend Micro products, which can
> be exploited by malicious people to cause a DoS (Denial of Service)
> or potentially compromise a vulnerable system.
>
> The vulnerability is caused due to an error within the processing of
> UPX compressed executables. This can be exploited to cause a buffer
> overflow when scanning a specially crafted UPX compressed executable
> file.
>
> Successful exploitation may allow execution of arbitrary code or
> cause the system to crash.
>
> The vulnerability reportedly affects all Trend Micro products and
> versions that use the Scan Engine and Pattern File technology.
>
> SOLUTION:
> Update the virus pattern file to 4.245.00 or higher.
>
> PROVIDED AND/OR DISCOVERED BY:
> Discovered by an anonymous person and reported via iDefense Labs.
>
> ORIGINAL ADVISORY:
> Trend Micro:
>
>
> iDefense Labs:
> .
> php?id=470
>
|