Trend Micro InterScan VirusWall Shared Directory Vulnerability

BID:2014

Info

Trend Micro InterScan VirusWall Shared Directory Vulnerability

Bugtraq ID: 2014
Class: Configuration Error
CVE:
Remote: Yes
Local: Yes
Published: Nov 28 2000 12:00AM
Updated: Nov 28 2000 12:00AM
Credit: Posted to Bugtraq on November 28, 2000 by Michael W. Shaffer <[email protected]>.
Vulnerable: Trend Micro InterScan VirusWall for Windows NT 3.4
- Microsoft Windows NT 4.0
Not Vulnerable:

Discussion

Trend Micro InterScan VirusWall Shared Directory Vulnerability

TrendMicro InterScan VirusWall is virus and malicious code scanner designed for internet gateways.

After completion of the installation process, the InterScan VirusWall installer assigns the 'Everyone' group 'Full Control' permissions in the Access Control List of the \Interscan directory and all of its contents without notifying the user. Corresponding permissions are also configured for the file share "Intscan" that is created during installation. This is done in order to enable the Interscan plug-in eManager to access files contained in the Interscan directory.

It is not a recommended practice to grant the 'Everyone' group 'Full Control' rights. This would give read, write, and execute privileges to any user for the directories specified above. Therefore, a malicious user may be able to upload, delete, modify, and execute files within the directory which opens up the possibility of a myriad of exploits that can be performed. The InterScan directory also contains executables that are run upon startup. This may lead to the automatic execution of implanted trojans or other malicious code.

Exploit / POC

Trend Micro InterScan VirusWall Shared Directory Vulnerability

See discussion.

Solution / Fix

Trend Micro InterScan VirusWall Shared Directory Vulnerability

Solution:
TrendMicro will be addressing this issue in future releases of InterScan VirusWall. Users will be prompted with an option to share the InterScan directory if they plan to install the eManager module.

© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report