VRDA Feed by JPCERT/CC
  Vulnerability Response Decision Assistance Feed : Information for vulnerability impact analysis
[ about VRDA Feed | JPCERT/CC



 
Vulnerability Analysis Result (Revision No : 1) [ Download XML
VRDA-100127-001
Trend Micro URL Filtering Engine Buffer Overflow Vulnerability
http://www.trendmicro.co.jp/support/news.asp?id=1358

弊社製品において、次の脆弱性の存在が確認されました。URLフィルタエンジンでバッファのオーバフローが発生する可能性があります。これにより、一般保護違反 (GPF) または製品でクラッシュが発生する可能性があります。




About This Analysis Information
Analysis Information Provider:
JPCERT/CC
First Published:
2010-01-27
Source Information Category:
Advisory, Alert
Last Updated:
2010-01-27




Affected Product Tags
lapt:/a:trend_micro:internet_security     (Trend Micro Internet Security)
lapt:/a:trend_micro:interscan_for_microsoft_exchange     (InterScan for Microsoft Exchange)
lapt:/a:trend_micro:interscan_gateway_security     (InterScan Gateway Security)
lapt:/a:trend_micro:interscan_viruswall     (InterScan VirusWall)
lapt:/a:trend_micro:interscan_web_security     (InterScan Web Security)
lapt:/a:trend_micro:trend_micro_business_security     (Trend Micro Business Security)
lapt:/a:trend_micro:trend_micro_threat_discovery     (Trend Micro Threat Discovery)
 


Vulnerability Analysis Results
[Information Source Reliability] [?]
Low [?]

Medium [?]
X High [?]

[Impact Level] [?]
Low [?]

X Low-Medium [?]
Medium-High [?]
High [?]

[Access Required] [?]
Physical [?]

Local [?]
Non-routed [?]
X Routed [?]

[Authentication] [?]
Privileged [?]

Standard [?]
Limited [?]
X None or Unnecessary [?]

[User Interaction Required] [?]
Complex [?]

X Simple [?]
None [?]

[Technical Difficulty] [?]
High [?]

Medium-High [?]
Low-Medium [?]
Low [?]

[Availability of Remediation] [?]
X Official Patch [?]

Official Workaround [?]
Unofficial Patch [?]
None [?]

[Incident Activity] [?]
X None [?]

Exploit or PoC [?]
Activity Observed [?]

Alternatives




References

Copyright © 2010 JPCERT/CC All Rights Reserved.