Trend Micro OfficeScan Client Traversal Arbitrary File Access

medium Nessus Plugin ID 34362

Synopsis

The remote web server is affected by a directory traversal issue.

Description

The version of Trend Micro OfficeScan client running on the remote host is affected by a directory traversal issue that can be leveraged by an unauthenticated, remote attacker to read arbitrary files on the remote host.

Note that successful exploitation requires that 'Tmlisten.exe' be configured to receive updates from other clients.

Solution

Upgrade to :

- Trend Micro OfficeScan 7.3 Build 3172.
- Trend Micro OfficeScan 8.0 Build 2439/3087 depending on the current OfficeScan patch level.
- Worry-Free Business Security 5.0 Build 1414.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2008-39/

http://www.nessus.org/u?14a47516

http://www.nessus.org/u?b5493c8c

http://www.nessus.org/u?c957bae3

http://www.nessus.org/u?cabe4087

Plugin Details

Severity: Medium

ID: 34362

File Name: trendmicro_officescan_client_dir_traversal.nasl

Version: 1.19

Type: remote

Family: Web Servers

Published: 10/8/2008

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:trend_micro:officescan

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Patch Publication Date: 9/30/2008

Reference Information

CVE: CVE-2008-2439

BID: 31531

CWE: 22

SECUNIA: 31343