search menu icon-carat-right cmu-wordmark

CERT Coordination Center

TrendMicro InterScan WebManager contains buffer overflow in RegGo.dll

Vulnerability Note VU#888283

Original Release Date: 2001-08-14 | Last Revised: 2001-08-15

Overview

A remotely exploitable buffer overflow exists in Trend Micro InterScan WebManager.

Description

InterScan WebManager is an application that inspects http traffic flowing into a network for known malicious code. This application also has the capability to restrict access to adult/unproductive web sites, manage and monitor web usage, monitor and control http traffic, and provide digital certificate revocation checking in SSL connections. If a secure Web site’s digital certificate has been revoked, InterScan WebManager has the capability to terminate the transaction.

A remotely exploitable buffer overflow exists in the RegGo dynamic link library module included in Trend Micro InterScan WebManager. This module provides management features for the system administrator over an http interface.

Impact

Attackers can execute arbitrary code with privileges equivalent to the web server process, typically SYSTEM. Attackers may also be able to inspect and modify all http traffic flowing through the device. Additionally, attackers may be able to disable digital certificate revocation checking in SSL connections thereby allowing access to intentionally malicious websites.

Solution

Trend Micro has indicated that this vulnerability has been eliminated in TrendMicro InterScan WebManager version 2.1. Contact Trend Micro for the upgrade.

Vendor Information

888283
 

Trend Micro Affected

Notified:  July 12, 2001 Updated: August 15, 2001

Status

Affected

Vendor Statement

"We are sorry to inform you that there is a minor bug in Trend Micro InterScan WebManager. We have fixed the bug in the next version of this product, Trend Micro InterScan WebManager version 2.1. The upgrade is now available for testing for customers using the product on English language operating systems. Please contact Trend Micro for download information."

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Little eArth Corporation Co., Ltd and was made public on July 2, 2001.

This document was written by Ian A. Finlay.

Other Information

CVE IDs: CVE-2001-0761
Severity Metric: 40.50
Date Public: 2001-07-02
Date First Published: 2001-08-14
Date Last Updated: 2001-08-15 13:15 UTC
Document Revision: 56

Sponsored by CISA.