Vulnerability Description
Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "t" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4744.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Interscan Messaging Security Virtual Appliance | 9.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/100075Third Party AdvisoryVDB Entry
- http://www.zerodayinitiative.com/advisories/ZDI-17-502Third Party AdvisoryVDB Entry
- https://success.trendmicro.com/solution/1117723Vendor Advisory
- http://www.securityfocus.com/bid/100075Third Party AdvisoryVDB Entry
- http://www.zerodayinitiative.com/advisories/ZDI-17-502Third Party AdvisoryVDB Entry
- https://success.trendmicro.com/solution/1117723Vendor Advisory
FAQ
What is CVE-2017-11391?
CVE-2017-11391 is a vulnerability with a CVSS score of 8.8 (HIGH). Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw ...
How severe is CVE-2017-11391?
CVE-2017-11391 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-11391?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Interscan Messaging Security Virtual Appliance.