First published: Thu Aug 03 2017(Updated: )
Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "t" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4744.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan Messaging Security Virtual Appliance | =9.0 | |
Trend Micro InterScan Messaging Security Virtual Appliance | =9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11391 is classified as a critical vulnerability that allows for remote code execution.
To mitigate CVE-2017-11391, you should update to the latest patched version of Trend Micro InterScan Messaging Security Virtual Appliance.
CVE-2017-11391 affects Trend Micro InterScan Messaging Virtual Appliance versions 9.0 and 9.1.
Yes, CVE-2017-11391 can be exploited remotely by attackers to execute arbitrary code.
The attack vector for CVE-2017-11391 involves injecting commands through the "t" parameter within modTMCSS Proxy.