COMMAND
HttpSaveC*P.dll
SYSTEMS AFFECTED
TrendMicro InterScan VirusWall 3.51
PROBLEM
Following is based on a SNS Advisory No.35. A buffer overflow
vulnerability was found in some administrative programs,
smtpscan.dll, of InterScan VirusWall for Windows NT. It allows a
remote user to execute an arbitrary command with SYSTEM privilege.
If long strings are included in a certain parameter of
configuration by exploiting the vulnerability that was reported
by SNS Advisory No.28, a buffer overflow occurs when requesting
the following dll(s):
http://server/interscan/cgi-bin/HttpSaveCVP.dll
http://server/interscan/cgi-bin/HttpSaveCSP.dll
The following are a memory dump and contents of register when a
buffer overflow occurs.
dump:
023FFAC2 6D 6D 6D 6E 6E 6E mmmnnn
023FFAC8 6F 6F 6F 70 70 70 oooppp
register:
EAX = 023FFAC8 EIP = 6E6E6E6D
Therefore, arbitrary code may be executed by calling eax which
may be replaced by an attacker's supplied arbitrary code.
Discovered by Nobuo Miwa.
SOLUTION
To get the patch, send e-mail to support@support.trendmicro.com or
search this issue on
http://solutionbank.antivirus.com/solutions/solutionSearch.asp