RULE(RULE ID:333054)

Rule General Information
Release Date: 2021-03-26
Rule Name: Trend Micro OfficeScan Client ActiveX Control Buffer Overflow Vulnerability (CVE-2007-0325)
Severity:
CVE ID:
Rule Protection Details
Description: There exists a buffer overflow vulnerability in the Trend Micro OfficeScan Client ActiveX control. The flaw is due the lack of proper boundary checks on the user-supplied data to the vulnerable ActiveX control OfficeScanSetupINICtrl. Successful exploitation of this vulnerability can allow for arbitrary code execution within the security context of the currently logged in user. In a simple attack case, the web browser application (Internet Explorer) will terminate immediately when the malicious page is opened. In a sophisticated attack scenario, where the malicious user is successful in injecting and executing supplied code, the behaviour of the system is dependent on the nature of the injected code. Any code injected into the vulnerable component would execute in the security context of the currently logged in user.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service.
Affected OS: Windows
Reference: SecurityFocusBID:22585
http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034288
http://www.kb.cert.org/vuls/id/784369
SecurityTrackerID:1017664
Solutions
Refer to the announcement or patch by the vendor: http://www.trendmicro.com/ftp/products/patches/osce_73_win_en_security