[20914] in bugtraq

home help back first fref pref prev next nref lref last post

[SNS Advisory No.29] Trend Micro Virus Control System(VCS) Unauthenticated CGI Usage Vulnerability

daemon@ATHENA.MIT.EDU (snsadv@lac.co.jp)
Fri Jun 8 11:46:24 2001

Date: Fri, 08 Jun 2001 11:43:32 +0900
From: "snsadv@lac.co.jp" <snsadv@lac.co.jp>
To: BUGTRAQ <BUGTRAQ@securityfocus.com>
Message-Id: <20010608114326.D374.SNSADV@lac.co.jp>
MIME-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: 7bit

SNS Advisory No.29
Trend Micro Virus Control System(VCS) Unauthenticated CGI Usage 
Vulnerability

Problem first discovered: 25 May 2001
Published: 7 Jun 2001 
Last Updated: 7 Jun 2001 
----------------------------------------------------------------------

Overview
--------
The vulnerability was found in a CGI program included in TrendMicro 
Virus Control System(VCS). It may be possible for a remote user to
access administrative program and data without authentication.

Problem
-------

VCS is a software package designed to operate and manage anti virus
product included in gateways, file servers, groupwares and clients.

In order to manage VCS, an administrator accesses with following URL.

http://VCSServer/tvcs/EnterPassword.html

Password for its administrator is required then normally. By calling 
a certain CGI program with unusual way, it is possible to change its
configuration and view configuration files.

Details can not be disclosed now because it has not been fixed yet
and it will not be fixed immediately.

Tested Version
--------------
  Virus Control System(VCS) Ver.1.8 Japanese
  Virus Control System(VCS) Ver.1.8 English

Tested OS
---------
  Windows 2000 Server Japanese
  Windows 2000 Server English

Patch Information
-----------------
No patches are available now.
Trend Micro support team responded that this problem will be fixed end 
of this year.

Until the patch will be released, set up access control to refuse access
to servers in which VCS is installed by non-administrative user.

Discovered by
-------------
	MIWA Nobuo (LAC / n-miwa@lac.co.jp)

Disclaimer
-----------
All information in this advisories are subject to change without any 
advanced notices neither mutual consensus, and each of them is released
as it is. LAC Co.,Ltd. is not responsible for any risks of occurrences
caused by applying those information.

References
----------
Archive of this advisory:
	http://www.lac.co.jp/security/english/snsadv_e/29_e.html

SNS Advisory:
	http://www.lac.co.jp/security/english/snsadv_e/

LAC:
	http://www.lac.co.jp/security/english/

------------------------------------------------------------------
Secure Net Service(SNS) Security Advisory <snsadv@lac.co.jp>
Computer Security Laboratory, LAC  http://www.lac.co.jp/security/



home help back first fref pref prev next nref lref last post