SecuriTeam"! - Trend Micro VirusWall Buffer Overflow in VSAPI Library

InterScanのLinux版において、検索エンジン脆弱性があるそうです。コマンドライン(vscan)においてvscanでroot権限で実行できそうみたい。

The product "InterScan VirusWall 3.81 for Linux" ships a legacy library called "libvsapi.so" which is vulnerable to a memory corruption vulnerability. One of the applications that apparently uses this library is called "vscan" which is set suid root by default. It was discovered that this supporting program is prone to a classic buffer overflow vulnerability when a particularly long command-line argument is being passed and the application utilizes the flawed library to attempt to copy that data into a finite buffer. On a Debian 3.1 test system for instance an attacker is required to supply 1116 + 4 bytes to completely overwrite the EIP register and thus execute arbitrary code with root level privileges: