Описание
Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to cause a denial of service (process consumption) via (1) an HTTP request without a Content-Length header or (2) invalid characters in unspecified CGI arguments, which triggers a NULL pointer dereference.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 7.3_patch3_build1314 (включая)Версия до 8.0_patch2_build1189 (включая)
Одно из
cpe:2.3:a:trend_micro:officescan_corporate_edition:*:*:*:*:*:*:*:*
cpe:2.3:a:trend_micro:officescan_corporate_edition:*:*:*:*:*:*:*:*
EPSS
Процентиль: 75%
0.00887
Низкий
5 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
почти 4 года назад
Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to cause a denial of service (process consumption) via (1) an HTTP request without a Content-Length header or (2) invalid characters in unspecified CGI arguments, which triggers a NULL pointer dereference.
EPSS
Процентиль: 75%
0.00887
Низкий
5 Medium
CVSS2
Дефекты
CWE-20