Trend Micro OfficeScan ObjRemoveCtrl Buffer Overflow Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Trend Micro OfficeScan, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. These issues are caused by buffer overflow errors in the Web-Deployment ObjRemoveCtrl Class ActiveX control (OfficeScanRemoveCtrl.dll) when processing malformed data passed to certain properties (e.g. "Server"), which could be exploited by remote attackers to crash an affected browser or execute arbitrary code by tricking a user into visiting a specially crafted web page.
Impact
- Denial of Service
- Remote Code Execution
System / Technologies affected
- Trend Micro OfficeScan (OSCE) versions 7.0, 7.3, and 8.0
- Trend Micro Worry-Free Business Security (WFBS) version 5.0
- Trend Micro Client Server Messaging Security (CSM) versions 3.5 and 3.6
Solutions
There is no patch available for this vulnerability currently.
Workaround
Set the kill bit to prevent the objRemoveCtrl from running in Internet Explorer.
http://support.microsoft.com/kb/240797/en-us
Vulnerability Identifier
Source
Share with