Trend Micro InterScan VirusWall Shared Directory Vulnerability
BID:2014
Info
Trend Micro InterScan VirusWall Shared Directory Vulnerability
| Bugtraq ID: | 2014 |
| Class: | Configuration Error |
| CVE: | |
| Remote: | Yes |
| Local: | Yes |
| Published: | Nov 28 2000 12:00AM |
| Updated: | Nov 28 2000 12:00AM |
| Credit: | Posted to Bugtraq on November 28, 2000 by Michael W. Shaffer <[email protected]>. |
| Vulnerable: |
Trend Micro InterScan VirusWall for Windows NT 3.4 |
| Not Vulnerable: | |
Discussion
Trend Micro InterScan VirusWall Shared Directory Vulnerability
TrendMicro InterScan VirusWall is virus and malicious code scanner designed for internet gateways.
After completion of the installation process, the InterScan VirusWall installer assigns the 'Everyone' group 'Full Control' permissions in the Access Control List of the \Interscan directory and all of its contents without notifying the user. Corresponding permissions are also configured for the file share "Intscan" that is created during installation. This is done in order to enable the Interscan plug-in eManager to access files contained in the Interscan directory.
It is not a recommended practice to grant the 'Everyone' group 'Full Control' rights. This would give read, write, and execute privileges to any user for the directories specified above. Therefore, a malicious user may be able to upload, delete, modify, and execute files within the directory which opens up the possibility of a myriad of exploits that can be performed. The InterScan directory also contains executables that are run upon startup. This may lead to the automatic execution of implanted trojans or other malicious code.
TrendMicro InterScan VirusWall is virus and malicious code scanner designed for internet gateways.
After completion of the installation process, the InterScan VirusWall installer assigns the 'Everyone' group 'Full Control' permissions in the Access Control List of the \Interscan directory and all of its contents without notifying the user. Corresponding permissions are also configured for the file share "Intscan" that is created during installation. This is done in order to enable the Interscan plug-in eManager to access files contained in the Interscan directory.
It is not a recommended practice to grant the 'Everyone' group 'Full Control' rights. This would give read, write, and execute privileges to any user for the directories specified above. Therefore, a malicious user may be able to upload, delete, modify, and execute files within the directory which opens up the possibility of a myriad of exploits that can be performed. The InterScan directory also contains executables that are run upon startup. This may lead to the automatic execution of implanted trojans or other malicious code.
Exploit / POC
Trend Micro InterScan VirusWall Shared Directory Vulnerability
See discussion.
See discussion.
Solution / Fix
Trend Micro InterScan VirusWall Shared Directory Vulnerability
Solution:
TrendMicro will be addressing this issue in future releases of InterScan VirusWall. Users will be prompted with an option to share the InterScan directory if they plan to install the eManager module.
Solution:
TrendMicro will be addressing this issue in future releases of InterScan VirusWall. Users will be prompted with an option to share the InterScan directory if they plan to install the eManager module.