|
Vulnerability InterScan VirusWall Affected TrendMicro InterScan VirusWall Description Michael W. Shaffer found following. This advisory concerns what seems to be a security 'feature' in all versions of InterScan SMTP VirusWall for Windows NT at least through version 3.4. The problem is not with the functionality of the product but with the behavior of its installer. This issue probably also affects installations of the FTP and HTTP VirusWall options as well, but our site only uses the SMTP 'module' of this product. The issue is that the ISVW installer appears to use the 'cacls' command to adjust the permissions of the InterScan program directory after it completes the installation. The alarming thing is that the adjustment which is made is the addition of 'Everyone - Full Control' to the ACL. This action is taken by the installer without any notification or question to the user and regardless of what filesystem permissions were set on the filesystem or parent directory before the install. This action also appears to be taken during the course of an upgrade as well as a clean install. As if this were not bad enough, the installer also creates a new file share which exports the same InterScan program directory; again with 'Everyone - Full Control' in the ACL and again without any notification to the user during the installation. The result of these two actions is that immediately after the installation is completed there will be a gaping hole in the machine on which ISVW resides which allows access to the ISVW executables for anyone. This share includes the executables for the ISVW service which normally would be started each time the machine is booted. The possibilities are easily imagined... In the real world, this feature affected one of our machines when our Exchange administrator performed an install. Because of the 'Everyone - Full Control' share, all of the ISVW executables were infected by a wandering copy of Win32 FunLove within minutes of installation, and the entire server was subsequently infected when the ISVW service was started. Compounding this problem is the fact that in normal operation a machine running ISVW cannot have any sort of anti-virus 'auto-protect' system turned on since ISVW and the auto-protect would fight over any temporary files used by ISVW to scan infected messages. In this case You can only detect the infection while running a manual virus scan a day or so after the installation. Solution Trend Micro has acknowledged that during installation, by default, InterScan VirusWall for Windows NT creates "Intscan" share to the "\InterScan" directory, and assigns the 'Everyone' group with 'Full Control' permission to the "Intscan" share. The purpose was to enable and faciliate InterScan plug-in, eManager, to access and process files in the InterScan directory. This had already been documented in the InterScan VirusWall Read Me: Product Notes ============================================================== 1. During installation, InterScan creates and shares certain directories for access by the optional eManager (e-mail content filter) plug-in. By default, these shares are accessible to all domain members. However, you can restrict access to only specific accounts, or remove them altogether if eManager will not be installed. To tighten security of the InterScan directory following its installation, please the follow the instructions below. If you're not using Trend eManager with InterScan NT, you may remove the "Intscan" share completely. If you're using Trend eManager with InterScan NT , you may remove the "Everyone" group from the "Intscan" share, but make sure you do assign a restricted account with Full Control permission to the "Intscan" share, and provide this account credential to the eManager service. This will allow eManager service to log using this restricted account, and have access to the "Intscan" share. An example is to setup "Intscan" share to allow Domain Administrator with Full Control, and then setting up eManager service to startup using the Domain Administrator credential. Trend Online Knowledge Base also contains information related to this topic: http://solutionbank.antivirus.com/solutions/solutionDetail.asp?solutionID=7123 http://solutionbank.antivirus.com/solutions/solutionDetail.asp?solutionID=4193 Trend Micro is currently incorporating changes to its next version of InterScan VirusWall for NT, which will address this shared directory issue. Users will be prompted with an option to share the InterScan directory if they plan to install the eManager module.