CVE-2017-14086

Pre-authorization Start Remote Process vulnerabilities in Trend Micro OfficeScan 11.0 and XG may allow unauthenticated users who can access the OfficeScan server to start the fcgiOfcDDA.exe executable or cause a potential INI corruption, which may cause the server disk space to be consumed with dump files from continuous HTTP requests.
References
Link Resource
http://hyp3rlinx.altervista.org/advisories/CVE-2017-14086-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-START-REMOTE-PROCESS-CODE-EXECUTION-MEM-CORRUPT.txt Exploit Third Party Advisory
http://packetstormsecurity.com/files/144401/TrendMicro-OfficeScan-11.0-XG-12.0-Auth-Start-Code-Execution.html Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2017/Sep/88 Mailing List Third Party Advisory
http://www.securityfocus.com/archive/1/541274/100/0/threaded
http://www.securityfocus.com/bid/101076 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039500 Third Party Advisory VDB Entry
https://success.trendmicro.com/solution/1118372 Patch Vendor Advisory
https://www.exploit-db.com/exploits/42892/ Third Party Advisory VDB Entry
http://hyp3rlinx.altervista.org/advisories/CVE-2017-14086-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-START-REMOTE-PROCESS-CODE-EXECUTION-MEM-CORRUPT.txt Exploit Third Party Advisory
http://packetstormsecurity.com/files/144401/TrendMicro-OfficeScan-11.0-XG-12.0-Auth-Start-Code-Execution.html Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2017/Sep/88 Mailing List Third Party Advisory
http://www.securityfocus.com/archive/1/541274/100/0/threaded
http://www.securityfocus.com/bid/101076 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039500 Third Party Advisory VDB Entry
https://success.trendmicro.com/solution/1118372 Patch Vendor Advisory
https://www.exploit-db.com/exploits/42892/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:trendmicro:officescan:11.0:sp1:*:*:*:*:*:*
cpe:2.3:a:trendmicro:officescan:12.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:12

Type Values Removed Values Added
References () http://hyp3rlinx.altervista.org/advisories/CVE-2017-14086-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-START-REMOTE-PROCESS-CODE-EXECUTION-MEM-CORRUPT.txt - Exploit, Third Party Advisory () http://hyp3rlinx.altervista.org/advisories/CVE-2017-14086-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-START-REMOTE-PROCESS-CODE-EXECUTION-MEM-CORRUPT.txt - Exploit, Third Party Advisory
References () http://packetstormsecurity.com/files/144401/TrendMicro-OfficeScan-11.0-XG-12.0-Auth-Start-Code-Execution.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/144401/TrendMicro-OfficeScan-11.0-XG-12.0-Auth-Start-Code-Execution.html - Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2017/Sep/88 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2017/Sep/88 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/archive/1/541274/100/0/threaded - () http://www.securityfocus.com/archive/1/541274/100/0/threaded -
References () http://www.securityfocus.com/bid/101076 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101076 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039500 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039500 - Third Party Advisory, VDB Entry
References () https://success.trendmicro.com/solution/1118372 - Patch, Vendor Advisory () https://success.trendmicro.com/solution/1118372 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/42892/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42892/ - Third Party Advisory, VDB Entry

Information

Published : 2017-10-06 01:29

Updated : 2024-11-21 03:12


NVD link : CVE-2017-14086

Mitre link : CVE-2017-14086

CVE.ORG link : CVE-2017-14086


JSON object : View

Products Affected

trendmicro

  • officescan
CWE
CWE-400

Uncontrolled Resource Consumption