Vulnerabilities > CVE-2006-6179 - Unspecified vulnerability in Trend Micro Officescan 7.3
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN trend-micro
nessus
Summary
Buffer overflow in PCCSRV\Web_console\RemoteInstallCGI\CgiRemoteInstall.exe for Trend Micro OfficeScan 7.3 before build 7.3.0.1089 allows remote attackers to execute arbitrary code via unknown attack vectors.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | CGI abuses |
NASL id | TRENDMICRO_OFFICESCAN_MULTIPLE.NASL |
description | The remote host appears to be running Trend Micro OfficeScan Server. This version of OfficeScan is vulnerable to multiple stack overflows in CGI programs that could allow a remote attacker to execute code in the context of the remote server. Note that OfficeScan server under Windows runs with SYSTEM privileges, which means an attacker can gain complete control of the affected host. In addition, there is a format string vulnerability in the |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22048 |
published | 2006-07-14 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22048 |
title | Trend Micro OfficeScan 7.3 Multiple Vulnerabilities |
code |
|
References
- http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1031753
- http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1031753
- http://solutionfile.trendmicro.com/SolutionFile/1031753/en/Hotfix_Readme_OSCE7_3_B1089.txt
- http://solutionfile.trendmicro.com/SolutionFile/1031753/en/Hotfix_Readme_OSCE7_3_B1089.txt
- http://www.securityfocus.com/bid/21442
- http://www.securityfocus.com/bid/21442
- http://www.vupen.com/english/advisories/2006/4852
- http://www.vupen.com/english/advisories/2006/4852