First published: Fri Apr 28 2017(Updated: )
dlp_policy_upload.cgi in Trend Micro Threat Discovery Appliance 2.6.1062r1 and earlier allows remote authenticated users to execute arbitrary code via an archive file containing a symlink to /eng_ptn_stores/prod/sensorSDK/data/ or /eng_ptn_stores/prod/sensorSDK/backup_pol/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Threat Discovery Appliance | <=2.6.1062 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8587 has been classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2016-8587, upgrade to a version of Trend Micro Threat Discovery Appliance later than 2.6.1062r1.
CVE-2016-8587 affects authenticated users of Trend Micro Threat Discovery Appliance version 2.6.1062r1 and earlier.
CVE-2016-8587 is a remote code execution vulnerability.
Attackers can execute arbitrary code on the system by exploiting CVE-2016-8587 through specially crafted archive files.