[NT] Trend Micro HouseCall ActiveX Control Arbitrary Code Execution
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 24 Dec 2008 16:06:48 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
Trend Micro HouseCall ActiveX Control Arbitrary Code Execution
"Trend Micro's HouseCall is an application for checking whether your
computer has been infected by viruses, spyware, or other malware.
HouseCall performs additional security checks to identify and fix
vulnerabilities to prevent reinfection." Secunia Research has discovered a
vulnerability in Trend Micro HouseCall, which can be exploited by
malicious people to compromise a user's system.
* Trend Micro HouseCall ActiveX Control version 220.127.116.118
* Trend Micro HouseCall ActiveX Control version 18.104.22.1688
* Trend Micro HouseCall ActiveX Control version 22.214.171.1245
The vulnerability is caused due to an implementation error within the
HouseCall ActiveX control (Housecall_ActiveX.dll). This can be exploited
to e.g. download and load an arbitrary library file by specifying a custom
Successful exploitation allows execution of arbitrary code.
Remove the ActiveX control and install version 126.96.36.1995 by going to
HouseCall Server Edition:
* Apply hotfix B1285.
18/08/2008 - Vendor notified.
19/08/2008 - Vendor response.
02/09/2008 - Vendor acknowledges vulnerability.
03/09/2008 - Vendor asks if version 6.6 is also affected.
03/09/2008 - Vendor informed that version 6.6 is not available.
09/09/2008 - Vendor informs that version 6.6 site is now accessible.
18/09/2008 - Vendor informed that version 6.6 is not affected by the
current exploit, but will be checked in-depth later.
23/09/2008 - Vendor informed that version 6.6 is also vulnerable when
using a slightly modified exploit.
27/09/2008 - Vendor provides status update.
13/11/2008 - Status update requested.
13/11/2008 - Vendor provides status update.
14/11/2008 - Vendor provides hotfix for testing.
14/11/2008 - Informed the vendor that the supplied hotfix does not address
the vulnerability properly.
18/11/2008 - Vendor requests updated exploit.
19/11/2008 - Updated exploit sent to the vendor.
22/12/2008 - Status update requested.
22/12/2008 - Vendor informs that hotfix for SA31583 also fixes this
22/12/2008 - Public disclosure.
The information has been provided by Secunia Research.
The original article can be found at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [NEWS] WiFi Router COMTREND Multiple Vulnerabilities
- Next by Date: [UNIX] Roundcubemail PHP Arbitrary Code Injection
- Previous by thread: [NEWS] WiFi Router COMTREND Multiple Vulnerabilities
- Next by thread: [UNIX] Roundcubemail PHP Arbitrary Code Injection