Trend Micro OfficeScan Client Firewall Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com(情報元のブックマーク数)

TrendmicroのCorp版FireWallに複数の脆弱性が発見されたとの事。

40000/TCPにサービス用のポートが待ち受けしてるみたいで、それが微妙みたい・・・

Secunia Research has discovered some vulnerabilities in Trend Micro OfficeScan Client, which can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security features, and potentially gain escalated privileges.

1) Input validation errors exist in the OfficeScan NT Firewall service (TmPfw.exe) within the "ApiThread()" function when processing packets sent to the service (by default port 40000/TCP). These can be exploited to cause heap-based buffer overflows via specially crafted packets containing a small value in a size field.

Successful exploitation may allow execution of arbitrary code with SYSTEM privileges.

2) Input validation errors exist in the OfficeScan NT Firewall service (TmPfw.exe) within the "ApiThread()" function when processing packets sent to the service (by default port 40000/TCP). These can be exploited to crash the service via specially crafted packets containing an overly large value in a size field.

3) Missing authentication to the OfficeScan NT Firewall service (TmPfw.exe) listening on port 40000/TCP by default can be exploited by any local user to manipulate the firewall configuration via specially crafted packets regardless of whether password restriction has been enabled for the configuration interface.

Security Advisory SA33609 - Trend Micro OfficeScan Client Firewall Multiple Vulnerabilities - Secunia

screenshot