Vulnerabilities > CVE-2006-5211 - Unspecified vulnerability in Trend Micro Officescan Corporate Edition 6.5/7.0/7.3
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to remove OfficeScan clients via a certain HTTP request that invokes the OfficeScan CGI program. A security patch for each affected product has been released by the vendor.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Nessus
NASL family | CGI abuses |
NASL id | TRENDMICRO_OFFICESCAN_MULTIPLE.NASL |
description | The remote host appears to be running Trend Micro OfficeScan Server. This version of OfficeScan is vulnerable to multiple stack overflows in CGI programs that could allow a remote attacker to execute code in the context of the remote server. Note that OfficeScan server under Windows runs with SYSTEM privileges, which means an attacker can gain complete control of the affected host. In addition, there is a format string vulnerability in the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22048 |
published | 2006-07-14 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22048 |
title | Trend Micro OfficeScan 7.3 Multiple Vulnerabilities |
code |
|
References
- http://secunia.com/advisories/22156
- http://www.securityfocus.com/bid/20330
- http://www.trendmicro.com/download/product.asp?productid=5
- http://www.trendmicro.com/ftp/documentation/readme/csm_2.0_osce_6.0_win_en_securitypatch_1385_readme.txt
- http://www.trendmicro.com/ftp/documentation/readme/osce_6.5_win_en_securitypatch_1418_readme.txt
- http://www.trendmicro.com/ftp/documentation/readme/osce_7.3_win_en_securitypatch_1053_readme.txt
- http://www.trendmicro.com/ftp/documentation/readme/osce_70_win_en_securitypatch_1257_readme.txt
- http://www.vupen.com/english/advisories/2006/3882