[NT] Trend Micro HouseCall ActiveX Control Arbitrary Code Execution



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Trend Micro HouseCall ActiveX Control Arbitrary Code Execution
------------------------------------------------------------------------


SUMMARY

"Trend Micro's HouseCall is an application for checking whether your
computer has been infected by viruses, spyware, or other malware.
HouseCall performs additional security checks to identify and fix
vulnerabilities to prevent reinfection." Secunia Research has discovered a
vulnerability in Trend Micro HouseCall, which can be exploited by
malicious people to compromise a user's system.

DETAILS

Vulnerable Systems:
* Trend Micro HouseCall ActiveX Control version 6.51.0.1028
* Trend Micro HouseCall ActiveX Control version 6.6.0.1278

Immune Systems:
* Trend Micro HouseCall ActiveX Control version 6.6.0.1285

The vulnerability is caused due to an implementation error within the
HouseCall ActiveX control (Housecall_ActiveX.dll). This can be exploited
to e.g. download and load an arbitrary library file by specifying a custom
update server.

Successful exploitation allows execution of arbitrary code.

Solution:
Remove the ActiveX control and install version 6.6.0.1285 by going to
<http://prerelease.trendmicro-europe.com/hc66/launch/>
http://prerelease.trendmicro-europe.com/hc66/launch/

HouseCall Server Edition:
* Apply hotfix B1285.

Time Table:
18/08/2008 - Vendor notified.
19/08/2008 - Vendor response.
02/09/2008 - Vendor acknowledges vulnerability.
03/09/2008 - Vendor asks if version 6.6 is also affected.
03/09/2008 - Vendor informed that version 6.6 is not available.
09/09/2008 - Vendor informs that version 6.6 site is now accessible.
18/09/2008 - Vendor informed that version 6.6 is not affected by the
current exploit, but will be checked in-depth later.
23/09/2008 - Vendor informed that version 6.6 is also vulnerable when
using a slightly modified exploit.
27/09/2008 - Vendor provides status update.
13/11/2008 - Status update requested.
13/11/2008 - Vendor provides status update.
14/11/2008 - Vendor provides hotfix for testing.
14/11/2008 - Informed the vendor that the supplied hotfix does not address
the vulnerability properly.
18/11/2008 - Vendor requests updated exploit.
19/11/2008 - Updated exploit sent to the vendor.
22/12/2008 - Status update requested.
22/12/2008 - Vendor informs that hotfix for SA31583 also fixes this
vulnerability.
22/12/2008 - Public disclosure.

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2434>
CVE-2008-2434


ADDITIONAL INFORMATION

The information has been provided by Secunia Research.
The original article can be found at:
<http://secunia.com/secunia_research/2008-32/>
http://secunia.com/secunia_research/2008-32/



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [NEWS] Openfire Jabber-Server Multiple Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... filter which is responsible for authentication could be completely ... SQL injection vulnerability. ... Since the vendor didn't release a patch within the last 6 months it is ...
    (Securiteam)
  • [NT] CA ARCserve Backup RPC "handle_t" Argument Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... CA ARCserve Backup RPC "handle_t" Argument Vulnerability ... 24/10/2007 - Vendor notified. ... 21/05/2008 - Vendor notifies expected release in October 2008. ...
    (Securiteam)
  • [UNIX] Multiple Vendor ImageMagick Sign Extension Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Multiple Vendor ImageMagick Sign Extension Vulnerability ...
    (Securiteam)
  • [UNIX] Happymall E-Commerce Input Validation Flaw Lets Remote Users Execute Arbitrary Commands
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Revin Aldi reported an input validation vulnerability in the Happymall ... The vendor reports that the 'member_html.cgi' script is also affected. ...
    (Securiteam)
  • [NT] Trend Micro HouseCall "notifyOnLoadNative()" Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Trend Micro HouseCall "notifyOnLoadNative" Vulnerability ... Trend Micro HouseCall ActiveX Control version 6.6.0.1278 ...
    (Securiteam)