Short Name |
HTTP:TRENDMICRO-FMT-STR |
---|---|
Severity |
High |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Trend Micro OfficeScan Atxconsole ActiveX Control Format String Vulnerability |
Release Date |
2011/07/26 |
Update Number |
1961 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known format string vulnerability in Trend Micro OfficeScan. It is due to a format string flaw in the Atxconsole ActiveX control, which allows for a buffer overflow and a potential diversion of the code execution flow. A remote attacker may exploit the vulnerability by enticing the target user to open a malicious HTML page, resulting in the execution of arbitrary code on the vulnerable host in the security context of the target browser. In an attack case where code injection is not successful, the browser which loads the ActiveX object will terminate abnormally. In a more sophisticated attack attempt which results in successful code injection, the behaviour of the target host is entirely dependent on the intended function of the injected code. The code in such a case would execute within the security context of the current user account.
Trend Micro OfficeScan is prone to a remote format-string vulnerability. This vulnerability requires a certain amount of user-interaction for an attack to occur, such as visiting a malicious website. A successful exploit would let a remote attacker execute code with the privileges of the currently logged-in user. Trend Micro OfficeScan Corporate Edition 7.3 is reported vulnerable. Other versions may be affected as well.