The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of OfficeScan

vulnerability CVE-2019-9489

Trend Micro OfficeScan: directory traversal

Synthesis of the vulnerability

An attacker can traverse directories of Trend Micro OfficeScan, in order to alter a file outside the service root path.
Impacted products: OfficeScan.
Severity: 2/4.
Consequences: data creation/edition.
Provenance: internet client.
Creation date: 08/04/2019.
Identifiers: 1122250, CVE-2019-9489, VIGILANCE-VUL-28960.

Description of the vulnerability

An attacker can traverse directories of Trend Micro OfficeScan, in order to alter a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-18331 CVE-2018-18332

Trend Micro OfficeScan XG: privilege escalation via Weak File Permissions

Synthesis of the vulnerability

An attacker can bypass restrictions via Weak File Permissions of Trend Micro OfficeScan XG, in order to escalate his privileges.
Impacted products: OfficeScan.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 2.
Creation date: 27/12/2018.
Identifiers: 1121674, CVE-2018-18331, CVE-2018-18332, VIGILANCE-VUL-28113.

Description of the vulnerability

An attacker can bypass restrictions via Weak File Permissions of Trend Micro OfficeScan XG, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2018-15364

Trend Micro OfficeScan: out-of-bounds memory reading via Named Pipe Request

Synthesis of the vulnerability

An attacker can force a read at an invalid address via Named Pipe Request of Trend Micro OfficeScan, in order to trigger a denial of service, or to obtain sensitive information.
Impacted products: OfficeScan.
Severity: 2/4.
Consequences: data reading, denial of service on service.
Provenance: user shell.
Creation date: 31/08/2018.
Identifiers: 1120678, CVE-2018-15364, VIGILANCE-VUL-27121, ZDI-18-964.

Description of the vulnerability

An attacker can force a read at an invalid address via Named Pipe Request of Trend Micro OfficeScan, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-10358 CVE-2018-10359 CVE-2018-10505

Trend Micro OfficeScan: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Trend Micro OfficeScan.
Impacted products: OfficeScan.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 7.
Creation date: 08/06/2018.
Identifiers: CVE-2018-10358, CVE-2018-10359, CVE-2018-10505, CVE-2018-10506, CVE-2018-10507, CVE-2018-10508, CVE-2018-10509, VIGILANCE-VUL-26356, ZDI-18-563, ZDI-18-564, ZDI-18-565, ZDI-18-566.

Description of the vulnerability

An attacker can use several vulnerabilities of Trend Micro OfficeScan.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-6218

Trend Micro OfficeScan: executing DLL code

Synthesis of the vulnerability

An attacker can create a malicious DLL, and then put it in the current directory of Trend Micro OfficeScan, in order to execute code.
Impacted products: OfficeScan.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: intranet server.
Creation date: 15/02/2018.
Identifiers: 1119326, CVE-2018-6218, JVN#28865183, VIGILANCE-VUL-25313.

Description of the vulnerability

An attacker can create a malicious DLL, and then put it in the current directory of Trend Micro OfficeScan, in order to execute code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2017-14083 CVE-2017-14084 CVE-2017-14085

Trend Micro OfficeScan: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Trend Micro OfficeScan.
Impacted products: OfficeScan.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights, data reading, data creation/edition, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 7.
Creation date: 28/09/2017.
Identifiers: CVE-2017-14083, CVE-2017-14084, CVE-2017-14085, CVE-2017-14086, CVE-2017-14087, CVE-2017-14088, CVE-2017-14089, VIGILANCE-VUL-23966, ZDI-17-828, ZDI-17-829.

Description of the vulnerability

Several vulnerabilities were announced in Trend Micro OfficeScan.

An attacker can bypass security features via Encryption Key Disclosure, in order to obtain sensitive information. [severity:2/4; CVE-2017-14083]

An attacker can use a vulnerability via CURL, in order to run code. [severity:3/4; CVE-2017-14084]

An attacker can bypass security features via NT Domain, in order to obtain sensitive information. [severity:2/4; CVE-2017-14085]

An attacker can use a vulnerability via DOS/INI, in order to run code. [severity:3/4; CVE-2017-14086]

An attacker can bypass access restrictions via Host Header Injection, in order to read or alter data. [severity:2/4; CVE-2017-14087]

An attacker can generate a memory corruption via tmwfp, in order to trigger a denial of service, and possibly to run code. [severity:3/4; CVE-2017-14088, ZDI-17-828, ZDI-17-829]

An unknown vulnerability was announced. [severity:2/4; CVE-2017-14089]
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2017-11393 CVE-2017-11394

Trend Micro OfficeScan: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Trend Micro OfficeScan.
Impacted products: OfficeScan.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights, client access/rights.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 01/08/2017.
Identifiers: 1117769, CVE-2017-11393, CVE-2017-11394, trendmicro_imsva_widget_exec.rb, trendmicro_officescan_widget_exec.rb, VIGILANCE-VUL-23420, ZDI-17-521, ZDI-17-522.

Description of the vulnerability

Several vulnerabilities were announced in Trend Micro OfficeScan.

An attacker can trigger a Cross Site Scripting via Mapping Display, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2017-11393, ZDI-17-522]

An attacker can use a vulnerability via Post-auth Command, in order to run code. [severity:3/4; CVE-2017-11394, ZDI-17-521]
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2017-5481 CVE-2017-8801

Trend Micro OfficeScan: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Trend Micro OfficeScan.
Impacted products: OfficeScan.
Severity: 2/4.
Consequences: client access/rights, data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 26/04/2017.
Identifiers: 1117204, CVE-2017-5481, CVE-2017-8801, VIGILANCE-VUL-22564.

Description of the vulnerability

Several vulnerabilities were announced in Trend Micro OfficeScan.

An attacker can bypass security features, in order to get encrypted passwords or password hashes. [severity:1/4]

An attacker can trigger a Cross Site Scripting, in order to run JavaScript code in the context of the web site. [severity:2/4]
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2017-5565 CVE-2017-5566 CVE-2017-5567

Antivirus: privilege escalation via Microsoft Application Verifier

Synthesis of the vulnerability

An attacker can bypass restrictions via Microsoft Application Verifier of Antivirus, in order to escalate his privileges.
Impacted products: Avast AV, NOD32 Antivirus, F-Secure AV, AVG AntiVirus, McAfee MOVE AntiVirus, VirusScan, Norton Antivirus, Norton Internet Security, Panda AV, Panda Internet Security, TrendMicro Internet Security, OfficeScan.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 5.
Creation date: 22/03/2017.
Identifiers: 1116957, CVE-2017-5565, CVE-2017-5566, CVE-2017-5567, CVE-2017-6186, CVE-2017-6417, VIGILANCE-VUL-22211.

Description of the vulnerability

An attacker can bypass restrictions via Microsoft Application Verifier of Antivirus, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin 20798

Trend Micro OfficeScan: directory traversal

Synthesis of the vulnerability

An attacker can traverse directories of Trend Micro OfficeScan, in order to read a file outside the service root path.
Impacted products: OfficeScan.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 07/10/2016.
Identifiers: 1114097, 2016-0116, VIGILANCE-VUL-20798.

Description of the vulnerability

The Trend Micro OfficeScan product offers a web service.

However, user's data are directly inserted in an access path. Sequences such as "/.." can thus be used to go in the upper directory.

An attacker can therefore traverse directories of Trend Micro OfficeScan, in order to read a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about OfficeScan: