Hi,

> This is a Buffer Overflow vulneravility in Trend Micro
> InterScan VirusWall for NT 3.5.
> RegGo.dll is the one.

There is a same buffer overflow in VirusWall for Japanese.
Any code with request will be executed remotely by "SYSTEM".
I've reported it to Trend Micro Japan office and they've
fixed within 24 hours and published a support news.

Support news in Japanese:
http://www.trendmicro.co.jp/support/news/news71.htm

Users of ver.3.51J needs to replace RegGo.dll to fixed
version that will be included in ver.3.52J
Or allow accesss 80/TCP to only administrators.

Fixed RegGo.dll download site:
http://www.trendmicro.co.jp/esolution/solutionDetail.asp?solutionId=2694

Here is a piece of test program..
        for ( i=0 ; i<820 ; i++ )
                sc[i] = 'a' ;
        sc[i++] = 0x15 ;
        sc[i++] = 0xAD ;
        sc[i++] = 0xEE ;
        sc[i++] = 0x77 ;
        sc[i++] = 0xCC ;        // any code will be executed

Our advisory:
http://www.lac.co.jp/security/english/test/interscan.html


Nobuo Miwa
[EMAIL PROTECTED]    ( @ @ )  http://www.lac.co.jp/security/
---------------o00o--(. .)--o00o---------------------------

Reply via email to