ID

VAR-201708-0983


CVE

CVE-2017-11391


TITLE

Trend Micro InterScan Messaging Security Virtual Appliance Command Injection Vulnerability

Trust: 2.0

sources: CNVD: CNVD-2017-21034 // JVNDB: JVNDB-2017-006619 // CNNVD: CNNVD-201707-675

DESCRIPTION

Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "t" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4744. Zero Day Initiative Is vulnerable to this vulnerability ZDI-CAN-4744 Was numbered.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the modTMCSS Proxy functionality. An attacker can leverage this vulnerability to execute arbitrary code under the context of the imss user. that integrates anti-virus, anti-spyware and anti-phishing technologies to provide comprehensive protection for email applications. The issue presents itself when the 'VirusEvent' directive in the 'clamav.conf' configuration file has been enabled and the 'Dazuko' module is used with the antivirus software. Although unconfirmed, all versions of the application are assumed to vulnerable at the moment. This information will be updated as more details become available. Failed exploit attempts will result in a denial-of-service condition

Trust: 3.33

sources: NVD: CVE-2017-11391 // JVNDB: JVNDB-2017-006619 // ZDI: ZDI-17-502 // CNVD: CNVD-2017-21034 // BID: 10007 // BID: 100075

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-21034

AFFECTED PRODUCTS

vendor:trend micromodel:interscan messaging security virtual appliancescope:eqversion:9.1

Trust: 1.7

vendor:trend micromodel:interscan messaging security virtual appliancescope:eqversion:9.0

Trust: 1.7

vendor:trendmicromodel:interscan messaging security virtual appliancescope:eqversion:9.0

Trust: 1.6

vendor:trendmicromodel:interscan messaging security virtual appliancescope:eqversion:9.1

Trust: 1.6

vendor:trend micromodel:interscan messaging securityscope: - version: -

Trust: 0.7

vendor:clammodel:anti-virus clamavscope:eqversion:0.68-1

Trust: 0.3

vendor:clammodel:anti-virus clamavscope:eqversion:0.68

Trust: 0.3

vendor:clammodel:anti-virus clamavscope:eqversion:0.67

Trust: 0.3

vendor:clammodel:anti-virus clamavscope:eqversion:0.65

Trust: 0.3

vendor:clammodel:anti-virus clamavscope:eqversion:0.60

Trust: 0.3

vendor:clammodel:anti-virus clamavscope:eqversion:0.54

Trust: 0.3

vendor:clammodel:anti-virus clamavscope:eqversion:0.53

Trust: 0.3

vendor:clammodel:anti-virus clamavscope:eqversion:0.52

Trust: 0.3

vendor:clammodel:anti-virus clamavscope:eqversion:0.51

Trust: 0.3

vendor:clammodel:anti-virus clamavscope:neversion:0.70

Trust: 0.3

sources: ZDI: ZDI-17-502 // CNVD: CNVD-2017-21034 // BID: 10007 // BID: 100075 // JVNDB: JVNDB-2017-006619 // CNNVD: CNNVD-201707-675 // NVD: CVE-2017-11391

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-11391
value: HIGH

Trust: 1.0

NVD: CVE-2017-11391
value: HIGH

Trust: 0.8

ZDI: CVE-2017-11391
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2017-21034
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201707-675
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2017-11391
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 2.5

CNVD: CNVD-2017-21034
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2017-11391
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: ZDI: ZDI-17-502 // CNVD: CNVD-2017-21034 // JVNDB: JVNDB-2017-006619 // CNNVD: CNNVD-201707-675 // NVD: CVE-2017-11391

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.8

sources: JVNDB: JVNDB-2017-006619 // NVD: CVE-2017-11391

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201707-675

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-201707-675

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-006619

PATCH

title:Solution ID: 1117723url:https://success.trendmicro.com/solution/1117723

Trust: 1.5

title:TrendMicroInterScanMessagingSecurityVirtualAppliance command to inject vulnerability patchesurl:https://www.cnvd.org.cn/patchInfo/show/100116

Trust: 0.6

sources: ZDI: ZDI-17-502 // CNVD: CNVD-2017-21034 // JVNDB: JVNDB-2017-006619

EXTERNAL IDS

db:NVDid:CVE-2017-11391

Trust: 4.0

db:ZDIid:ZDI-17-502

Trust: 3.2

db:BIDid:100075

Trust: 1.3

db:BIDid:10007

Trust: 0.9

db:JVNid:JVNVU94207433

Trust: 0.8

db:JVNid:JVNVU98736894

Trust: 0.8

db:JVNDBid:JVNDB-2017-006619

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-4744

Trust: 0.7

db:CNVDid:CNVD-2017-21034

Trust: 0.6

db:CNNVDid:CNNVD-201707-675

Trust: 0.6

db:ZDIid:ZDI-17-504

Trust: 0.3

sources: ZDI: ZDI-17-502 // CNVD: CNVD-2017-21034 // BID: 10007 // BID: 100075 // JVNDB: JVNDB-2017-006619 // CNNVD: CNNVD-201707-675 // NVD: CVE-2017-11391

REFERENCES

url:https://success.trendmicro.com/solution/1117723

Trust: 2.6

url:http://www.zerodayinitiative.com/advisories/zdi-17-502

Trust: 2.2

url:http://www.securityfocus.com/bid/100075

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-11391

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94207433/

Trust: 0.8

url:http://jvn.jp/vu/jvnvu98736894/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-11391

Trust: 0.8

url:http://www.clamav.net/

Trust: 0.3

url:/archive/1/359017

Trust: 0.3

url:http://www.trend.com

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-17-502/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-17-504/

Trust: 0.3

sources: ZDI: ZDI-17-502 // CNVD: CNVD-2017-21034 // BID: 10007 // BID: 100075 // JVNDB: JVNDB-2017-006619 // CNNVD: CNNVD-201707-675 // NVD: CVE-2017-11391

CREDITS

Steven Seeley (mr_me) of Offensive Security

Trust: 0.7

sources: ZDI: ZDI-17-502

SOURCES

db:ZDIid:ZDI-17-502
db:CNVDid:CNVD-2017-21034
db:BIDid:10007
db:BIDid:100075
db:JVNDBid:JVNDB-2017-006619
db:CNNVDid:CNNVD-201707-675
db:NVDid:CVE-2017-11391

LAST UPDATE DATE

2024-08-14T13:30:03.233000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-17-502date:2017-07-31T00:00:00
db:CNVDid:CNVD-2017-21034date:2017-08-15T00:00:00
db:BIDid:10007date:2004-03-30T00:00:00
db:BIDid:100075date:2017-07-31T00:00:00
db:JVNDBid:JVNDB-2017-006619date:2017-12-27T00:00:00
db:CNNVDid:CNNVD-201707-675date:2017-08-04T00:00:00
db:NVDid:CVE-2017-11391date:2017-08-07T22:12:49.323

SOURCES RELEASE DATE

db:ZDIid:ZDI-17-502date:2017-07-31T00:00:00
db:CNVDid:CNVD-2017-21034date:2017-08-15T00:00:00
db:BIDid:10007date:2004-03-30T00:00:00
db:BIDid:100075date:2017-07-31T00:00:00
db:JVNDBid:JVNDB-2017-006619date:2017-08-30T00:00:00
db:CNNVDid:CNNVD-201707-675date:2017-07-18T00:00:00
db:NVDid:CVE-2017-11391date:2017-08-03T15:29:00.327