CVE-2015-3326

Trend Micro ScanMail for Microsoft Exchange (SMEX) 10.2 before Hot Fix Build 3318 and 11.0 before Hot Fix Build 4180 creates session IDs for the web console using a random number generator with predictable values, which makes it easier for remote attackers to bypass authentication via a brute force attack.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trend_micro:scanmail:10.2:*:*:*:*:microsoft_exchange:*:*
cpe:2.3:a:trend_micro:scanmail:11.0:*:*:*:*:microsoft_exchange:*:*

History

21 Nov 2024, 02:29

Type Values Removed Values Added
References () http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html - () http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html -
References () http://esupport.trendmicro.com/solution/en-US/1109669.aspx - Vendor Advisory () http://esupport.trendmicro.com/solution/en-US/1109669.aspx - Vendor Advisory
References () http://www.securityfocus.com/bid/74661 - () http://www.securityfocus.com/bid/74661 -
References () http://www.securitytracker.com/id/1032323 - () http://www.securitytracker.com/id/1032323 -

Information

Published : 2015-05-14 00:59

Updated : 2024-11-21 02:29


NVD link : CVE-2015-3326

Mitre link : CVE-2015-3326

CVE.ORG link : CVE-2015-3326


JSON object : View

Products Affected

trend_micro

  • scanmail