Published:2018/01/30  Last Updated:2018/01/30

JVNVU#95587881
Deep Discovery Email Inspector vulnerable to arbitrary code execution

Overview

Deep Discovery Email Inspector provided by Trend Micro Incorporated contains an arbitrary code execution vulnerability.

Products Affected

  • Deep Discovery Email Inspector Version 2.5.1 prior to Critical Patch b1182

Description

Deep Discovery Email Inspector provided by Trend Micro Incorporated contains an arbitrary code execution vulnerability due to an issue in uploading files.

Impact

An unauthenticated remote attacker may upload an arbitrary file to the system where the product resides. As a result, arbitrary code may be executed with the root privilege.

Solution

Apply the Patch
Apply the appropriate patch according to the information provided by the developer.
The developer has released the patch listed below to fix this vulnerability.

  • Deep Discovery Email Inspector 2.5.1 Critical Patch b1182

References

JPCERT/CC Addendum

This advisory mentions the vulnerability that is published on the TippingPoint Zero Day Initiative advisory, ZDI-17-283.

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score: 9.8
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)
CVSS v2 AV:N/AC:L/Au:N/C:C/I:C/A:C
Base Score: 10.0
Access Vector(AV) Local (L) Adjacent Network (A) Network (N)
Access Complexity(AC) High (H) Medium (M) Low (L)
Authentication(Au) Multiple (M) Single (S) None (N)
Confidentiality Impact(C) None (N) Partial (P) Complete (C)
Integrity Impact(I) None (N) Partial (P) Complete (C)
Availability Impact(A) None (N) Partial (P) Complete (C)

Credit

Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia