TUCoPS :: Security App Flaws :: vwall1~1.htm

VirusWall for NT 3.51 - buffer overflow
Vulnerability

    VirusWall

Affected

    Trend Micro InterScan VirusWall for Windows NT 3.51

Description

    Following is  based on  a SNS  Advisory No.31.   A buffer overflow
    vulnerability was found in administrative programs, FtpSaveCSP.dll
    and FtpSaveCVP.dll,  of InterScan  VirusWall for  Windows NT.   It
    allows a remote user to  execute an arbitrary command with  SYSTEM
    privilege.

    If  long  strings   are  included  in   a  certain  parameter   of
    configuration  by  exploitation  of  the  vulnerability  that  was
    reported  by  SNS  Advisory  No.28,  a buffer overflow occurs when
    viewing following dll(s):

        http://server/interscan/cgi-bin/FtpSaveCSP.dll
        http://server/interscan/cgi-bin/FtpSaveCVP.dll

    A buffer overflow occurs with following dump(Japanese version):

        00F9FC04  4F 50 50 50 51 51  OPPPQQ
        00F9FC0A  51 52 52 52 53 53  QRRRSS
        00F9FC10  53 54 54 54 55 55  STTTUU
        00F9FC16  55 56 61 62 63 64  UVabcd
        00F9FC1C  57 58 58 58 59 59  WXXXYY
        00F9FC22  59 5A 5A 5A 61 61  YZZZaa
        00F9FC28  61 61 61 61 61 61  aaaaaa
        00F9FC2E  61 61 61 61 61 61  aaaaaa

    register:

        EAX = 00F9FC1C  EIP = 64636261

    Therefore, arbitrary code may be executed by calling eax, replaced
    a value with attacker  supplied arbitrary address.   Combined with
    the vulnerability of ftpsave.dll  in SNS Advisory No.28,  a remote
    user can easily launch an attack.

    Discovered by Nobuo Miwa.

Solution

    Trend Micro Japanese  support team responded  nothing.  Until  the
    patch will be released, set up access control to refuse access  to
    servers   in   which   InterScan   VirusWall   is   installed   by
    non-administrative user.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH