Vulnerability Name:

CVE-2017-14087

Assigned:2017-08-31
Published:2017-10-05
Updated:2017-10-13
Summary:A Host Header Injection vulnerability in Trend Micro OfficeScan XG (12.0) may allow an attacker to spoof a particular Host header, allowing the attacker to render arbitrary links that point to a malicious website with poisoned Host header webpages.
CVSS v3 Severity:7.5 High (CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): High
Availibility (A): None
5.3 Medium (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-20
References:Source: MISC
Type: VENDOR_ADVISORY
http://hyp3rlinx.altervista.org/advisories/CVE-2017-14087-TRENDMICRO-OFFICESCAN-XG-HOST-HEADER-INJECTION.txt

Source: MISC
Type: VENDOR_ADVISORY
http://packetstormsecurity.com/files/144404/TrendMicro-OfficeScan-11.0-XG-12.0-Host-Header-Injection.html

Source: FULLDISC
Type: VENDOR_ADVISORY
20170929 Trend Micro OfficeScan v11.0 and XG (12.0)* Host Header Injection CVE-2017-14087

Source: BUGTRAQ
Type: VENDOR_ADVISORY
20170928 CVE-2017-14087 Trend Micro OfficeScan v11.0 and XG (12.0)* Host Header Injection (apparitionsec / hyp3rlinx)

Source: BID
Type: VENDOR_ADVISORY
101074

Source: SECTRACK
Type: VENDOR_ADVISORY
1039500

Source: CONFIRM
Type: VENDOR_ADVISORY
https://success.trendmicro.com/solution/1118372

Source: EXPLOIT-DB
Type: VENDOR_ADVISORY
42895

Vulnerable Configuration:Configuration 1:
  • cpe:/a:trendmicro:officescan:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:trendmicro:officescan:12.0:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    BACK
    trendmicro officescan 11.0
    trendmicro officescan 12.0