Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Linux "Ghost" Remote Code Execution Vulnerability (CVE-2015-0235)

    • Updated:
    • 11 Oct 2017
    • Product/Version:
    • Core Protection Module - ESP
    • Deep Discovery Analyzer
    • Deep Security
    • Endpoint Encryption
    • Interscan Messaging Security Virtual Appliance
    • Interscan Web Security Virtual Appliance
    • Securecloud On-Premise
    • Smart Protection Server
    • Platform:
    • N/A N/A
Summary

Trend Micro is aware of the soon to be officially announced Linux “GHOST” remote code execution vulnerability (CVE-2015-0235). This vulnerability affects Linux GNU C Library (glibc) versions prior to version 2.18.

Details
Public

Trend Micro is investigating if any of its products and services may be affected and/or are vulnerable. Below is the reviewed VRTS data as of February 3, 2015. This list will continually be updated as the investigation on additional products are completed, as well as information for any patches or solutions required if necessary.

Products that are not affected:

ProductsVersion
Core Protection Module for MacAll versions
Deep SecurityAll versions
InterScan for UnixAll versions
InterScan Messaging Security SuiteAll versions
InterScan VirusWall6.02
ScanMail for IBM Domino5.6
ScanMail for Lotus Domino3.0, 5.0, 5.5
ServerProtect for LinuxAll versions
TitaniumAll versions
Titanium for MacAll versions
Trend Micro Full Disk Encryption5.0, 3.1.3
Trend Micro Security for Mac2
Product affected:
ProductsVersionFix Location
Deep Discovery Advisor3.0 SP1DDA 3.0 SP1 Critical Patch 3093
Deep Discovery Analyzer5.0DDAN 5.0 Critical Patch 1076
InterScan Messaging Virtual Appliance8.0, 8.2, 8.5, 9.0IMSVA 8.0 Critical Patch 15020
IMSVA 8.2 Critical Patch 17670
IMSVA 8.5 Critical Patch 16290
IMSVA 9.0 Critical Patch 15140
Trend Micro Smart Protection Server2.5, 2.6, 3.0TMSPS 2.5 Critical Patch 2197
TMSPS 2.6 Critical Patch 2092
TMSPS 3.0 Critical Patch 1212

Customers and partners who may need some additional information or have questions are encouraged to contact their authorized Trend Micro Technical Support representatives for assistance.

References:

Premium
Internal
Rating:
Category:
Troubleshoot
Solution Id:
1107597
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.