Overview
A remotely exploitable buffer overflow exists in Trend Micro InterScan WebManager.
Description
InterScan WebManager is an application that inspects http traffic flowing into a network for known malicious code. This application also has the capability to restrict access to adult/unproductive web sites, manage and monitor web usage, monitor and control http traffic, and provide digital certificate revocation checking in SSL connections. If a secure Web site’s digital certificate has been revoked, InterScan WebManager has the capability to terminate the transaction. A remotely exploitable buffer overflow exists in the RegGo dynamic link library module included in Trend Micro InterScan WebManager. This module provides management features for the system administrator over an http interface. |
Impact
Attackers can execute arbitrary code with privileges equivalent to the web server process, typically SYSTEM. Attackers may also be able to inspect and modify all http traffic flowing through the device. Additionally, attackers may be able to disable digital certificate revocation checking in SSL connections thereby allowing access to intentionally malicious websites. |
Solution
Trend Micro has indicated that this vulnerability has been eliminated in TrendMicro InterScan WebManager version 2.1. Contact Trend Micro for the upgrade. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was discovered by Little eArth Corporation Co., Ltd and was made public on July 2, 2001.
This document was written by Ian A. Finlay.
Other Information
CVE IDs: | CVE-2001-0761 |
Severity Metric: | 40.50 |
Date Public: | 2001-07-02 |
Date First Published: | 2001-08-14 |
Date Last Updated: | 2001-08-15 13:15 UTC |
Document Revision: | 56 |