CVE-2008-2439
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
03/10/2008
Last modified:
09/04/2025
Description
Directory traversal vulnerability in the UpdateAgent function in TmListen.exe in the OfficeScanNT Listener service in the client in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1372, OfficeScan 8.0 SP1 before build 1222, OfficeScan 8.0 SP1 Patch 1 before build 3087, and Worry-Free Business Security 5.0 before build 1220 allows remote attackers to read arbitrary files via directory traversal sequences in an HTTP request. NOTE: some of these details are obtained from third party information.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:trend_micro:officescan:7.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:trend_micro:officescan:8.0:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:trend_micro:officescan:8.0:sp1_patch1:*:*:*:*:*:* | ||
| cpe:2.3:a:trend_micro:worry_free_business_security:5.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/31343
- http://secunia.com/advisories/32097
- http://secunia.com/secunia_research/2008-39/
- http://www.securityfocus.com/archive/1/496970/100/0/threaded
- http://www.securityfocus.com/bid/31531
- http://www.securitytracker.com/id?1020975=
- http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt
- http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1372_Readme.txt
- http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt
- http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5.0_EN_CriticalPatch1414.txt
- http://www.vupen.com/english/advisories/2008/2711
- http://www.vupen.com/english/advisories/2008/2712
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45597
- http://secunia.com/advisories/31343
- http://secunia.com/advisories/32097
- http://secunia.com/secunia_research/2008-39/
- http://www.securityfocus.com/archive/1/496970/100/0/threaded
- http://www.securityfocus.com/bid/31531
- http://www.securitytracker.com/id?1020975=
- http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt
- http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1372_Readme.txt
- http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt
- http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5.0_EN_CriticalPatch1414.txt
- http://www.vupen.com/english/advisories/2008/2711
- http://www.vupen.com/english/advisories/2008/2712
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45597



