First published: Mon Mar 17 2008(Updated: )
Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to cause a denial of service (process consumption) via (1) an HTTP request without a Content-Length header or (2) invalid characters in unspecified CGI arguments, which triggers a NULL pointer dereference.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro OfficeScan Corporate Edition | <=7.3_patch3_build1314 | |
Trend Micro OfficeScan Corporate Edition | <=8.0_patch2_build1189 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1366 has been rated as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2008-1366, you should update Trend Micro OfficeScan Corporate Edition to the latest version that is not affected.
CVE-2008-1366 affects Trend Micro OfficeScan Corporate Edition versions 7.3 Patch 3 build 1314 and earlier, and 8.0 Patch 2 build 1189 and earlier.
CVE-2008-1366 allows remote attackers to perform denial of service attacks leading to process consumption.
CVE-2008-1366 can be exploited through HTTP requests without a Content-Length header or via invalid characters in unspecified CGI arguments.