First published: Fri Apr 28 2017(Updated: )
admin_sys_time.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code as the root user via shell metacharacters in the timezone parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Threat Discovery Appliance | <=2.6.1062 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8585 has a high severity rating due to the ability for remote authenticated users to execute arbitrary code as the root user.
To fix CVE-2016-8585, update the Trend Micro Threat Discovery Appliance to version 2.6.1063 or later.
CVE-2016-8585 affects users of Trend Micro Threat Discovery Appliance versions 2.6.1062r1 and earlier.
CVE-2016-8585 facilitates remote code execution attacks by allowing the exploitation of shell metacharacters in the timezone parameter.
Yes, exploitation of CVE-2016-8585 requires remote authentication as a user of the Trend Micro Threat Discovery Appliance.