TippingPoint Zero Day Initiative
 

TrendMicro Control Manager CmdProcessor.exe AddTask Remote Code Execution Vulnerability

ZDI-11-345: December 7th, 2011

CVSS Score

Affected Vendors

Affected Products

    Control Manager

TippingPoint™ IPS Customer Protection

TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 11469. For further product information on the TippingPoint IPS:

Vulnerability Details


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trent Micro Control Manager. Authentication is not required to exploit this vulnerability.

The specific flaw exists within CmdProcessor.exe service running on TCP port 20101. The vulnerable function is the CGenericScheduler::AddTask function of cmdHandlerRedAlertController.dll. When processing a specially crafted IPC packet, controlled data is copied into a 256-byte stack buffer. This can be exploited to execute remote code under the context of the user

Vendor Response

Trend Micro has issued an update to correct this vulnerability. More details can be found at:

Disclosure Timeline

    2011-04-04 - Vulnerability reported to vendor
    2011-12-07 - Coordinated public release of advisory

Credit

This vulnerability was discovered by:
    Luigi Auriemma