← Voltar para CVEs
CVE-2008-2433
CRITICAL9.8
Descricao
The web management console in Trend Micro OfficeScan 7.0 through 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote attackers to hijack sessions via brute-force attacks. NOTE: this can be leveraged for code execution through an unspecified "manipulation of the configuration."
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado8/27/2008
Ultima modificacao4/9/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
trendmicro:client_server_messaging_suitetrendmicro:officescantrendmicro:worry-free_business_security
Fraquezas (CWE)
CWE-330
Referencias
http://secunia.com/advisories/31373(PSIRT-CNA@flexerasoftware.com)
http://secunia.com/secunia_research/2008-31/advisory/(PSIRT-CNA@flexerasoftware.com)
http://securityreason.com/securityalert/4191(PSIRT-CNA@flexerasoftware.com)
http://www.securityfocus.com/archive/1/495670/100/0/threaded(PSIRT-CNA@flexerasoftware.com)
http://www.securityfocus.com/bid/30792(PSIRT-CNA@flexerasoftware.com)
http://www.securitytracker.com/id?1020732(PSIRT-CNA@flexerasoftware.com)
http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2402_readme.txt(PSIRT-CNA@flexerasoftware.com)
http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5%200_EN_CriticalPatch1404.txt(PSIRT-CNA@flexerasoftware.com)
http://www.vupen.com/english/advisories/2008/2421(PSIRT-CNA@flexerasoftware.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44597(PSIRT-CNA@flexerasoftware.com)
http://secunia.com/advisories/31373(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/secunia_research/2008-31/advisory/(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/4191(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/495670/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/30792(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1020732(af854a3a-2127-422b-91ae-364da2661108)
http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2402_readme.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5%200_EN_CriticalPatch1404.txt(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/2421(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44597(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.