First published: Wed Aug 27 2008(Updated: )
The web management console in Trend Micro OfficeScan 7.0 through 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote attackers to hijack sessions via brute-force attacks. NOTE: this can be leveraged for code execution through an unspecified "manipulation of the configuration."
Credit: PSIRT-CNA@flexerasoftware.com PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Client-Server Messaging Suite SMB | =3.5 | |
Trend Micro Client-Server Messaging Suite SMB | =3.6 | |
Trend Micro OfficeScan | >=7.0<=8.0 | |
Trend Micro Worry-Free Business Security | =5.0 | |
Trend Micro Client Server Messaging Security | =3.5 | |
Trend Micro Client Server Messaging Security | =3.6 | |
Trend Micro OfficeScan XG | =7.0 | |
Trend Micro OfficeScan XG | =7.3 | |
Trend Micro OfficeScan XG | =8.0 | |
Trend Micro Worry-Free Business Security | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2433 is classified as a high-severity vulnerability that can allow remote session hijacking.
To fix CVE-2008-2433, update to the latest version of the affected Trend Micro products that address this vulnerability.
CVE-2008-2433 affects Trend Micro OfficeScan versions 7.0 to 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite versions 3.5 and 3.6.
CVE-2008-2433 enables remote attackers to perform brute-force attacks and hijack user sessions.
CVE-2008-2433 can be exploited with relative ease due to the predictable nature of the session token generation.