ID

VAR-200712-0223


CVE

CVE-2007-6386


TITLE

Trend Micro AntiVirus Such as PccScan.dll Vulnerable to stack-based buffer overflow

Trust: 0.8

sources: JVNDB: JVNDB-2007-006431

DESCRIPTION

Stack-based buffer overflow in PccScan.dll before build 1451 in Trend Micro AntiVirus plus AntiSpyware 2008, Internet Security 2008, and Internet Security Pro 2008 allows user-assisted remote attackers to cause a denial of service (SfCtlCom.exe crash), and allows local users to gain privileges, via a malformed .zip archive with a long name, as demonstrated by a .zip file created via format string specifiers in a crafted .uue file. Trend Micro Antivirus Plus Antispyware is prone to a denial-of-service vulnerability. ---------------------------------------------------------------------- 2003: 2,700 advisories published 2004: 3,100 advisories published 2005: 4,600 advisories published 2006: 5,300 advisories published How do you know which Secunia advisories are important to you? The Secunia Vulnerability Intelligence Solutions allows you to filter and structure all the information you need, so you can address issues effectively. The vulnerability is caused due to a boundary error within PccScan.dll when decoding UUE files and can be exploited to cause a buffer overflow via a specially crafted UUE file. NOTE: The vendor's advisory states that the vulnerability is caused due to a format-string error when handling certain fields of a UUE file during decoding. It is not clear if this is a separate vulnerability. http://solutionfile.trendmicro.com/solutionfile/1036464/EN/tis_160_win_en_patch_pccscan1451.exe PROVIDED AND/OR DISCOVERED BY: Sowhat, Nevis Labs ORIGINAL ADVISORY: Trend Micro: http://esupport.trendmicro.com/support/viewxml.do?ContentID=1036464 Sowhat: http://secway.org/advisory/AD20071211.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.98

sources: NVD: CVE-2007-6386 // JVNDB: JVNDB-2007-006431 // BID: 81509 // PACKETSTORM: 61785

AFFECTED PRODUCTS

vendor:trend micromodel:antivirus plus antispywarescope:eqversion:2008

Trust: 2.4

vendor:trend micromodel:internet security virus bustscope:eqversion:2008

Trust: 1.6

vendor:trend micromodel:internet security proscope:eqversion:*

Trust: 1.0

vendor:trend micromodel:internet security virus bustscope: - version: -

Trust: 0.8

vendor:trend micromodel:internet security proscope:eqversion:2008

Trust: 0.8

vendor:trend micromodel:internet security proscope: - version: -

Trust: 0.6

vendor:trend micromodel:internet security proscope:eqversion:0

Trust: 0.3

vendor:trend micromodel:internet security virus bust bldscope:eqversion:20081451

Trust: 0.3

vendor:trend micromodel:antivirus plus antispyware bldscope:eqversion:20081450

Trust: 0.3

sources: BID: 81509 // JVNDB: JVNDB-2007-006431 // CNNVD: CNNVD-200712-158 // NVD: CVE-2007-6386

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2007-6386
value: HIGH

Trust: 1.8

CNNVD: CNNVD-200712-158
value: HIGH

Trust: 0.6

NVD: CVE-2007-6386
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2007-006431 // CNNVD: CNNVD-200712-158 // NVD: CVE-2007-6386

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

sources: JVNDB: JVNDB-2007-006431 // NVD: CVE-2007-6386

THREAT TYPE

local

Trust: 0.9

sources: BID: 81509 // CNNVD: CNNVD-200712-158

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200712-158

CONFIGURATIONS

sources: NVD: CVE-2007-6386

PATCH

title:Top Pageurl:http://www.trendmicro.com/

Trust: 0.8

sources: JVNDB: JVNDB-2007-006431

EXTERNAL IDS

db:NVDid:CVE-2007-6386

Trust: 2.7

db:SECTRACKid:1019079

Trust: 1.9

db:SECUNIAid:28038

Trust: 1.7

db:OSVDBid:39770

Trust: 1.6

db:OSVDBid:39769

Trust: 1.6

db:VUPENid:ADV-2007-4191

Trust: 1.6

db:XFid:38982

Trust: 0.9

db:JVNDBid:JVNDB-2007-006431

Trust: 0.8

db:CNNVDid:CNNVD-200712-158

Trust: 0.6

db:BIDid:81509

Trust: 0.3

db:PACKETSTORMid:61785

Trust: 0.1

sources: BID: 81509 // JVNDB: JVNDB-2007-006431 // PACKETSTORM: 61785 // CNNVD: CNNVD-200712-158 // NVD: CVE-2007-6386

REFERENCES

url:http://secway.org/advisory/ad20071211.txt

Trust: 2.0

url:http://esupport.trendmicro.com/support/viewxml.do?contentid=1036464

Trust: 2.0

url:http://www.securitytracker.com/id?1019079

Trust: 1.9

url:http://secunia.com/advisories/28038

Trust: 1.6

url:http://osvdb.org/39770

Trust: 1.6

url:http://osvdb.org/39769

Trust: 1.6

url:http://www.vupen.com/english/advisories/2007/4191

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/38982

Trust: 1.0

url:http://xforce.iss.net/xforce/xfdb/38982

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-6386

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-6386

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/4191

Trust: 0.6

url:http://secunia.com/product/16915/

Trust: 0.1

url:http://solutionfile.trendmicro.com/solutionfile/1036464/en/tis_160_win_en_patch_pccscan1451.exe

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/16917/

Trust: 0.1

url:http://secunia.com/product/16916/

Trust: 0.1

url:http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/28038/

Trust: 0.1

sources: BID: 81509 // JVNDB: JVNDB-2007-006431 // PACKETSTORM: 61785 // CNNVD: CNNVD-200712-158 // NVD: CVE-2007-6386

CREDITS

Unknown

Trust: 0.3

sources: BID: 81509

SOURCES

db:BIDid:81509
db:JVNDBid:JVNDB-2007-006431
db:PACKETSTORMid:61785
db:CNNVDid:CNNVD-200712-158
db:NVDid:CVE-2007-6386

LAST UPDATE DATE

2022-05-04T08:59:20.749000+00:00


SOURCES UPDATE DATE

db:BIDid:81509date:2007-12-14T00:00:00
db:JVNDBid:JVNDB-2007-006431date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200712-158date:2007-12-14T00:00:00
db:NVDid:CVE-2007-6386date:2017-08-08T01:29:00

SOURCES RELEASE DATE

db:BIDid:81509date:2007-12-14T00:00:00
db:JVNDBid:JVNDB-2007-006431date:2012-12-20T00:00:00
db:PACKETSTORMid:61785date:2007-12-13T18:34:25
db:CNNVDid:CNNVD-200712-158date:2007-12-14T00:00:00
db:NVDid:CVE-2007-6386date:2007-12-15T02:46:00