Skip to main content

Trend Micro OfficeScan ObjRemoveCtrl Buffer Overflow Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 29 Jul 2008 5333 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Trend Micro OfficeScan, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. These issues are caused by buffer overflow errors in the Web-Deployment ObjRemoveCtrl Class ActiveX control (OfficeScanRemoveCtrl.dll) when processing malformed data passed to certain properties (e.g. "Server"), which could be exploited by remote attackers to crash an affected browser or execute arbitrary code by tricking a user into visiting a specially crafted web page.


Impact

  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • Trend Micro OfficeScan (OSCE) versions 7.0, 7.3, and 8.0
  • Trend Micro Worry-Free Business Security (WFBS) version 5.0
  • Trend Micro Client Server Messaging Security (CSM) versions 3.5 and 3.6

Solutions

There is no patch available for this vulnerability currently.

Workaround
Set the kill bit to prevent the objRemoveCtrl from running in Internet Explorer.
http://support.microsoft.com/kb/240797/en-us


Vulnerability Identifier


Source