Computer Security
[EN] securityvulns.ru no-pyccku


Trend Micro multiple application authentication bypass
Published:25.08.2008
Source:
SecurityVulns ID:9243
Type:remote
Threat Level:
6/10
Description:Weak PRNG generator is used to generate session cookie.
Affected:TM : OfficeScan 7.3
 TM : OfficeScan 7.0
 TM : OfficeScan 8.0
 TM : Worry-Free Business Security 5.0
 TM : Trend Micro Messaging Suite 3.5
 TM : Trend Micro Messaging Suite 3.6
CVE:CVE-2008-2433 (The web management console in Trend Micro OfficeScan 7.0 through 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote attackers to hijack sessions via brute-force attacks. NOTE: this can be leveraged for code execution through an unspecified "manipulation of the configuration.")
Original documentdocumentSECUNIA, Secunia Research: Trend Micro Products Web Management Authentication Bypass (25.08.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod