Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2017-14086
Deferred
More InfoOfficial Page
Source-security@trendmicro.com
View Known Exploited Vulnerability (KEV) details
Published At-06 Oct, 2017 | 01:29
Updated At-20 Apr, 2025 | 01:37

Pre-authorization Start Remote Process vulnerabilities in Trend Micro OfficeScan 11.0 and XG may allow unauthenticated users who can access the OfficeScan server to start the fcgiOfcDDA.exe executable or cause a potential INI corruption, which may cause the server disk space to be consumed with dump files from continuous HTTP requests.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.5HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:N/I:N/A:C
CPE Matches

Trend Micro Incorporated
trendmicro
>>officescan>>11.0
cpe:2.3:a:trendmicro:officescan:11.0:sp1:*:*:*:*:*:*
Trend Micro Incorporated
trendmicro
>>officescan>>12.0
cpe:2.3:a:trendmicro:officescan:12.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-400Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://hyp3rlinx.altervista.org/advisories/CVE-2017-14086-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-START-REMOTE-PROCESS-CODE-EXECUTION-MEM-CORRUPT.txtsecurity@trendmicro.com
Exploit
Third Party Advisory
http://packetstormsecurity.com/files/144401/TrendMicro-OfficeScan-11.0-XG-12.0-Auth-Start-Code-Execution.htmlsecurity@trendmicro.com
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2017/Sep/88security@trendmicro.com
Mailing List
Third Party Advisory
http://www.securityfocus.com/archive/1/541274/100/0/threadedsecurity@trendmicro.com
N/A
http://www.securityfocus.com/bid/101076security@trendmicro.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1039500security@trendmicro.com
Third Party Advisory
VDB Entry
https://success.trendmicro.com/solution/1118372security@trendmicro.com
Patch
Vendor Advisory
https://www.exploit-db.com/exploits/42892/security@trendmicro.com
Third Party Advisory
VDB Entry
http://hyp3rlinx.altervista.org/advisories/CVE-2017-14086-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-START-REMOTE-PROCESS-CODE-EXECUTION-MEM-CORRUPT.txtaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
http://packetstormsecurity.com/files/144401/TrendMicro-OfficeScan-11.0-XG-12.0-Auth-Start-Code-Execution.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2017/Sep/88af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
http://www.securityfocus.com/archive/1/541274/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/101076af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1039500af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://success.trendmicro.com/solution/1118372af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
https://www.exploit-db.com/exploits/42892/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
Change History
0Changes found

Details not found