{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Trend Micro OfficeScan Corporate Edition 8.x.","product":{"name":"N/A","vendor":{"name":"Trend Micro","scada":false}}},{"description":"Trend Micro Client Server Messaging Security for SMB 3.x ;","product":{"name":"N/A","vendor":{"name":"Trend Micro","scada":false}}},{"description":"Trend Micro OfficeScan Corporate Edition 7.x ;","product":{"name":"N/A","vendor":{"name":"Trend Micro","scada":false}}},{"description":"Trend Micro Client Server Messaging Security for SMB 2.x ;","product":{"name":"N/A","vendor":{"name":"Trend Micro","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nUne vuln\u00e9rabilit\u00e9 de type de d\u00e9bordement de m\u00e9moire a \u00e9t\u00e9 d\u00e9couverte\ndans l'application cgiRecvFile.exe. Cette vuln\u00e9rabilit\u00e9 peut \u00eatre\nexploit\u00e9e au moyen d'une requ\u00eate HTTP sp\u00e9cialement construite afin\nd'ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nLes correctifs de s\u00e9curit\u00e9 sont disponibles sur le site de l'\u00e9diteur aux\nadresses suivantes :\n\n    http://www.trendmicro.com/ftp/products/patches/CSM_3.6_OSCE_7.6_Win_EN_CriticalPatch_B1195_readme.exe\n\n    http://www.trendmicro.com/ftp/products/patches/OSCE_7.3_Win_EN_CriticalPatch_B1367_readme.exe\n\n    http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_SP1_Patch1_Win_EN_CriticalPatch_B3060_readme.txt\n\n    http://www.trendmicro.com/ftp/products/patches/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2424_readme.txt\n\n    http://www.trendmicro.com/ftp/products/patches//OSCE_8.0_Win_EN_CriticalPatch_B1361_readme.txt\n","cves":[{"name":"CVE-2008-2437","url":"https://www.cve.org/CVERecord?id=CVE-2008-2437"}],"links":[],"reference":"CERTA-2008-AVI-459","revisions":[{"description":"version initiale.","revision_date":"2008-09-15T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"Une vuln\u00e9rabilit\u00e9 dans les produits Trend Micro permet \u00e0 un utilisateur\ndistant malintentionn\u00e9 d'ex\u00e9cuter du code arbitraire \u00e0 distance.\n","title":"Vuln\u00e9rabilit\u00e9 dans Trend Micro OfficeScan Server","vendor_advisories":[{"published_at":null,"title":"Bulletins de s\u00e9curit\u00e9 Trend Micro du 12 septembre 2008","url":"http://www.trendmicro.com/ftp/documentation/readme//OSCE_8.0_Win_EN_CriticalPatch_B1361_readme.txt"}]}
