Date: 23 October 2008
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
===========================================================================
A U S C E R T A L E R T
AL-2008.0108 -- AUSCERT ALERT
[Win]
Trend Micro OfficeScan Critical Patch Released
23 October 2008
===========================================================================
AusCERT Alert Summary
---------------------
Product: Trend Micro OfficeScan 7.3
Trend Micro OfficeScan 8.0 SP 1 Patch 1
Publisher: CCIRC
Operating System: Windows
Impact: Execute Arbitrary Code/Commands
Access: Remote/Unauthenticated
Original Bulletin: http://www.publicsafety.gc.ca/prg/em/ccirc/2008/av08-079-eng.aspx
Revision History: May 10 2012: Corrected details
October 23 2008: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
PUBLIC SAFETY CANADA
CANADIAN CYBER INCIDENT RESPONSE CENTRE
*****************
ADVISORY
*****************
Number: AV08-079
Date: 22 October 2008
*********************************************
Trend Micro OfficeScan Critical Patch Release
*********************************************
PURPOSE
- ---------
A vulnerability has been reported in Trend Micro OfficeScan product. This
vulnerability is due to a stack-based buffer overflow condition, which could
allow an attacker to execute arbitrary code on the affected system.
ASSESSMENT
- -------------
This patch addresses a potential security issue, which causes a stack-based
buffer overflow. This condition is triggered by sending a specially crafted
HTTP request containing form data to the server CGI module.
Trend Micro OfficeScan 7.3 Critical Patch - Build 1374 CGI modules
This critical patch can be applied to any language version that OfficeScan
supports. After applying Critical patch 1374, the buffer overflow issue is
addressed by replacing old modules with the updated modules.
Trend Micro OfficeScan 8.0 SP 1 Patch 1 Critical Patch - Build 3110 CGI modules
After applying Critical patch 3110, the buffer overflow issue is addressed by
replacing old modules with the updated modules. NOTE: Install hot fix 3110
only on computers running OfficeScan 8.0 Service Pack 1 Patch 1.
Affected Products:
Trend Micro OfficeScan 7.3
Trend Micro OfficeScan 8.0 SP 1 Patch 1
SUGGESTED ACTION
- ----------------
CCIRC recommends that administrators test and install the patch from Trend
Micro OfficeScan version 7.3 or 8.0 SP 1 Patch 1, as applicable, at the
earliest opportunity. See links to patches below.
Trend Micro OfficeScan 8.0 SP1 Patch 1 Critical Patch - Build 3110 CGI modules:
http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_SP1_Patch1_Win_EN_CriticalPatch_B3110.exe
Trend Micro OfficeScan 7.3 Critical Patch - Build 1374 CGI modules:
http://www.trendmicro.com/ftp/products/patches/OSCE_7.3_Win_EN_CriticalPatch_B1374.exe
REFERENCES:
- -----------
http://www.trendmicro.com/download/product.asp?productid=5
Note to Readers
Public Safety Canada collects information related to cyber and physical
threats to, and incidents involving, Canadian critical infrastructure.
This allows us to monitor and analyze threats and to issue alerts,
advisories, and other information products.
The Government Operations Centre (GOC) provides strategic level coordination
and direction on behalf of the Government of Canada, in response to emerging
or occurring events in the national interest, including threats to and
incidents involving Canadian critical infrastructure. The GOC receives,
shares, and coordinates information with other federal departments, as well
as provincial/territorial and international partners.
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/render.html?cid=1980
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
http://www.auscert.org.au/render.html?it=3192
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=S7qs
-----END PGP SIGNATURE-----
|