First published: Fri Sep 28 2012(Updated: )
SQL injection vulnerability in the ad hoc query module in Trend Micro Control Manager (TMCM) before 5.5.0.1823 and 6.0 before 6.0.0.1449 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Control Manager | <=5.5 | |
Trend Micro Control Manager | =2.0 | |
Trend Micro Control Manager | =2.1 | |
Trend Micro Control Manager | =2.5 | |
Trend Micro Control Manager | =3.0 | |
Trend Micro Control Manager | =3.0 | |
Trend Micro Control Manager | =3.5 | |
Trend Micro Control Manager | =3.5 | |
Trend Micro Control Manager | =5.0 | |
Trend Micro Control Manager | =5.0 | |
Trend Micro Control Manager | =5.5 | |
Trend Micro Control Manager | =6.0 |
http://www.trendmicro.com/ftp/documentation/readme/readme_critical_patch_tmcm60_patch1_1449.txt
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2998 is considered a high severity vulnerability due to its potential for remote SQL command execution.
To fix CVE-2012-2998, upgrade Trend Micro Control Manager to version 5.5.0.1823 or later, or 6.0.0.1449 or later.
CVE-2012-2998 affects various versions of Trend Micro Control Manager, including versions 2.0 through 6.0.
Yes, CVE-2012-2998 can be exploited remotely by attackers to execute arbitrary SQL commands.
There is no official workaround for CVE-2012-2998; upgrading is strongly recommended to mitigate the risk.