First published: Thu Aug 03 2017(Updated: )
Proxy command injection vulnerability in Trend Micro InterScan Messaging Virtual Appliance 9.0 and 9.1 allows remote attackers to execute arbitrary code on vulnerable installations. The specific flaw can be exploited by parsing the "T" parameter within modTMCSS Proxy. Formerly ZDI-CAN-4745.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan Messaging Security Virtual Appliance | =9.0 | |
Trend Micro InterScan Messaging Security Virtual Appliance | =9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11392 has a high severity rating due to its potential for remote code execution.
To mitigate CVE-2017-11392, upgrade to a patched version of Trend Micro InterScan Messaging Virtual Appliance that addresses this vulnerability.
CVE-2017-11392 affects Trend Micro InterScan Messaging Virtual Appliance versions 9.0 and 9.1.
Yes, CVE-2017-11392 can be exploited remotely, allowing attackers to execute arbitrary code.
CVE-2017-11392 is classified as a proxy command injection vulnerability.