Vulnerabilities > Trend Micro > Officescan > Medium

DATE CVE VULNERABILITY TITLE RISK
2009-01-21 CVE-2008-3866 Improper Authentication vulnerability in Trend Micro products
The Trend Micro Personal Firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, relies on client-side password protection implemented in the configuration GUI, which allows local users to bypass intended access restrictions and change firewall settings by using a modified client to send crafted packets.
local
low complexity
trend-micro CWE-287
4.6
2009-01-21 CVE-2008-3864 Improper Input Validation vulnerability in Trend Micro products
The ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allows remote attackers to cause a denial of service (service crash) via a packet with a large value in an unspecified size field.
network
low complexity
trend-micro CWE-20
5.0
2008-10-03 CVE-2008-4403 Resource Management Errors vulnerability in Trend Micro Officescan 8.0
The CGI modules in the server in Trend Micro OfficeScan 8.0 SP1 before build 2439 and 8.0 SP1 Patch 1 before build 3087 allow remote attackers to cause a denial of service (NULL pointer dereference and child process crash) via crafted HTTP headers, related to the "error handling mechanism."
network
low complexity
trend-micro CWE-399
5.0
2008-10-03 CVE-2008-2439 Path Traversal vulnerability in Trend Micro Officescan and Worry Free Business Security
Directory traversal vulnerability in the UpdateAgent function in TmListen.exe in the OfficeScanNT Listener service in the client in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1372, OfficeScan 8.0 SP1 before build 1222, OfficeScan 8.0 SP1 Patch 1 before build 3087, and Worry-Free Business Security 5.0 before build 1220 allows remote attackers to read arbitrary files via directory traversal sequences in an HTTP request.
network
low complexity
trend-micro CWE-22
5.0
2006-10-10 CVE-2006-5212 Unspecified vulnerability in Trend Micro Officescan
Trend Micro OfficeScan 6.0 in Client/Server/Messaging (CSM) Suite for SMB 2.0 before 6.0.0.1385, and OfficeScan Corporate Edition (OSCE) 6.5 before 6.5.0.1418, 7.0 before 7.0.0.1257, and 7.3 before 7.3.0.1053 allow remote attackers to delete files via a modified filename parameter in a certain HTTP request that invokes the OfficeScan CGI program.
network
low complexity
trend-micro
5.0
2006-10-05 CVE-2006-5157 Unspecified vulnerability in Trend Micro Officescan Corporate7.3
Format string vulnerability in the ActiveX control (ATXCONSOLE.OCX) in TrendMicro OfficeScan Corporate Edition (OSCE) before 7.3 Patch 1 allows remote attackers to execute arbitrary code via format string identifiers in the "Management Console's Remote Client Install name search".
network
high complexity
trend-micro
5.1
2005-10-30 CVE-2005-3379 Unspecified vulnerability in Trend Micro Officescan and Pc-Cillin 2005
Multiple interpretation error in Trend Micro (1) PC-Cillin 2005 12.0.1244 with the 7.510.1002 engine and (2) OfficeScan 7.0 with the 7.510.1002 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug."
network
high complexity
trend-micro
5.1
2004-05-07 CVE-2004-2006 Unspecified vulnerability in Trend Micro Officescan
Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection.
local
low complexity
trend-micro
4.6
2001-10-15 CVE-2001-1151 Information Disclosure vulnerability in Virus Buster
Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.53 allows remote attackers to access sensitive information from the hotdownload directory without authentication, such as the ofcscan.ini configuration file, which contains a weakly encrypted password.
network
low complexity
trend-micro
5.0
2001-08-22 CVE-2001-1150 Unspecified vulnerability in Trend Micro Officescan and Virus Buster
Vulnerability in cgiWebupdate.exe in Trend Micro OfficeScan Corporate Edition (aka Virus Buster) 3.5.2 through 3.5.4 allows remote attackers to read arbitrary files.
network
low complexity
trend-micro
5.0