Advisory Details

December 7th, 2011

TrendMicro Control Manager CmdProcessor.exe AddTask Remote Code Execution Vulnerability

ZDI-11-345
ZDI-CAN-1138

CVE ID
CVSS SCORE 9.7, AV:N/AC:L/Au:N/C:C/I:P/A:C
AFFECTED VENDORS Trend Micro
AFFECTED PRODUCTS Control Manager
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['11469']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trent Micro Control Manager. Authentication is not required to exploit this vulnerability.

The specific flaw exists within CmdProcessor.exe service running on TCP port 20101. The vulnerable function is the CGenericScheduler::AddTask function of cmdHandlerRedAlertController.dll. When processing a specially crafted IPC packet, controlled data is copied into a 256-byte stack buffer. This can be exploited to execute remote code under the context of the user

ADDITIONAL DETAILS Trend Micro has issued an update to correct this vulnerability. More details can be found at:
http://downloadcenter.trendmicro.com/index.php?prodid=7
DISCLOSURE TIMELINE
  • 2011-04-04 - Vulnerability reported to vendor
  • 2011-12-07 - Coordinated public release of advisory
CREDIT Luigi Auriemma
BACK TO ADVISORIES