Vulnerability Description
Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "T" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4745.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Interscan Messaging Security Virtual Appliance | 9.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/100075
- http://www.zerodayinitiative.com/advisories/ZDI-17-504Third Party AdvisoryVDB Entry
- https://success.trendmicro.com/solution/1117723Vendor Advisory
- http://www.securityfocus.com/bid/100075
- http://www.zerodayinitiative.com/advisories/ZDI-17-504Third Party AdvisoryVDB Entry
- https://success.trendmicro.com/solution/1117723Vendor Advisory
FAQ
What is CVE-2017-11392?
CVE-2017-11392 is a vulnerability with a CVSS score of 8.8 (HIGH). Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw ...
How severe is CVE-2017-11392?
CVE-2017-11392 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-11392?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Interscan Messaging Security Virtual Appliance.