Vulnerabilities > CVE-2015-3326 - Unspecified vulnerability in Trend Micro Scanmail 10.2/11.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN trend-micro
nessus
Summary
Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote attackers to bypass authentication via a brute force attack.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family | Windows |
NASL id | TRENDMICRO_SMEX_11_0_4180.NASL |
description | The version of Trend Micro ScanMail for Exchange (SMEX) installed on the remote Windows host is affected by a flaw in its bundled web-based user interface due to insufficient complexity in the generation of session IDs. A remote attacker, by more easily guessing the session ID, can use an authenticated user |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 84007 |
published | 2015-06-05 |
reporter | This script is Copyright (C) 2015-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/84007 |
title | Trend Micro ScanMail for Exchange 10.2 < Build 3318 / 11.x < Build 4180 Predictable Session IDs |
code |
|
References
- http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html
- http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html
- http://esupport.trendmicro.com/solution/en-US/1109669.aspx
- http://esupport.trendmicro.com/solution/en-US/1109669.aspx
- http://www.securityfocus.com/bid/74661
- http://www.securityfocus.com/bid/74661
- http://www.securitytracker.com/id/1032323
- http://www.securitytracker.com/id/1032323