CVE-2008-2439

Directory traversal vulnerability in the UpdateAgent function in TmListen.exe in the OfficeScanNT Listener service in the client in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1372, OfficeScan 8.0 SP1 before build 1222, OfficeScan 8.0 SP1 Patch 1 before build 3087, and Worry-Free Business Security 5.0 before build 1220 allows remote attackers to read arbitrary files via directory traversal sequences in an HTTP request. NOTE: some of these details are obtained from third party information.
References
Link Resource
http://secunia.com/advisories/31343 Patch Vendor Advisory
http://secunia.com/advisories/32097 Patch Vendor Advisory
http://secunia.com/secunia_research/2008-39/ Vendor Advisory
http://www.securityfocus.com/archive/1/496970/100/0/threaded
http://www.securityfocus.com/bid/31531
http://www.securitytracker.com/id?1020975
http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt Patch
http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1372_Readme.txt Patch
http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt Patch
http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5.0_EN_CriticalPatch1414.txt Patch
http://www.vupen.com/english/advisories/2008/2711
http://www.vupen.com/english/advisories/2008/2712
https://exchange.xforce.ibmcloud.com/vulnerabilities/45597
http://secunia.com/advisories/31343 Patch Vendor Advisory
http://secunia.com/advisories/32097 Patch Vendor Advisory
http://secunia.com/secunia_research/2008-39/ Vendor Advisory
http://www.securityfocus.com/archive/1/496970/100/0/threaded
http://www.securityfocus.com/bid/31531
http://www.securitytracker.com/id?1020975
http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt Patch
http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1372_Readme.txt Patch
http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt Patch
http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5.0_EN_CriticalPatch1414.txt Patch
http://www.vupen.com/english/advisories/2008/2711
http://www.vupen.com/english/advisories/2008/2712
https://exchange.xforce.ibmcloud.com/vulnerabilities/45597
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trend_micro:officescan:7.3:*:*:*:*:*:*:*
cpe:2.3:a:trend_micro:officescan:8.0:sp1:*:*:*:*:*:*
cpe:2.3:a:trend_micro:officescan:8.0:sp1_patch1:*:*:*:*:*:*
cpe:2.3:a:trend_micro:worry_free_business_security:5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:46

Type Values Removed Values Added
References () http://secunia.com/advisories/31343 - Patch, Vendor Advisory () http://secunia.com/advisories/31343 - Patch, Vendor Advisory
References () http://secunia.com/advisories/32097 - Patch, Vendor Advisory () http://secunia.com/advisories/32097 - Patch, Vendor Advisory
References () http://secunia.com/secunia_research/2008-39/ - Vendor Advisory () http://secunia.com/secunia_research/2008-39/ - Vendor Advisory
References () http://www.securityfocus.com/archive/1/496970/100/0/threaded - () http://www.securityfocus.com/archive/1/496970/100/0/threaded -
References () http://www.securityfocus.com/bid/31531 - () http://www.securityfocus.com/bid/31531 -
References () http://www.securitytracker.com/id?1020975 - () http://www.securitytracker.com/id?1020975 -
References () http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt - Patch () http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt - Patch
References () http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1372_Readme.txt - Patch () http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1372_Readme.txt - Patch
References () http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt - Patch () http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt - Patch
References () http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5.0_EN_CriticalPatch1414.txt - Patch () http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5.0_EN_CriticalPatch1414.txt - Patch
References () http://www.vupen.com/english/advisories/2008/2711 - () http://www.vupen.com/english/advisories/2008/2711 -
References () http://www.vupen.com/english/advisories/2008/2712 - () http://www.vupen.com/english/advisories/2008/2712 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/45597 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/45597 -

Information

Published : 2008-10-03 15:07

Updated : 2024-11-21 00:46


NVD link : CVE-2008-2439

Mitre link : CVE-2008-2439

CVE.ORG link : CVE-2008-2439


JSON object : View

Products Affected

trend_micro

  • worry_free_business_security
  • officescan
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')