Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Linux "Ghost" Remote Code Execution Vulnerability (CVE-2015-0235)

    • Updated:
    • 7 Dec 2016
    • Product/Version:
    • Advanced Reporting and Management for InterScan Web Security 1.5
    • Advanced Reporting and Management for InterScan Web Security 1.6
    • Core Protection Module 10.5
    • Core Protection Module 10.6
    • Deep Discovery Advisor 3.0
    • Deep Discovery Analyzer 5.0
    • Deep Security 8.0
    • Deep Security 9.0
    • Deep Security 9.5
    • Deep Security for Web Apps 2.0
    • Email Encryption Gateway 5.5
    • Endpoint Encryption 3.1 Full Disk Encrypti
    • Endpoint Encryption 3.1 PolicyServer
    • Endpoint Encryption 5.0
    • InterScan for Cisco CSC-SSM 6.3
    • InterScan for Cisco CSC-SSM 6.6
    • InterScan Messaging Security Suite All.All
    • InterScan Web Security as a Service 1.9
    • InterScan Web Security as a Service 2.0
    • InterScan Web Security Suite All.All
    • InterScan Web Security Virtual Appliance 6.0
    • InterScan Web Security Virtual Appliance 6.5
    • OfficeScan 10.6
    • OfficeScan 11.0
    • SafeSync for Enterprise 2.0
    • SafeSync for Enterprise 2.1
    • ScanMail for Exchange 10.2
    • ScanMail for Exchange 11.0
    • ScanMail for Lotus Domino All.All
    • SecureCloud 3.5
    • ServerProtect for Linux 3.0
    • Threat Discovery Appliance 2.5
    • Threat Discovery Appliance 2.6
    • Threat Mitigator 2.6
    • Titanium Internet Security for Mac All.All
    • Trend Micro Smart Protection Server 2.5
    • Trend Micro Smart Protection Server 2.6
    • Worry-Free Business Security Standard/Advanced 7.0
    • Worry-Free Business Security Standard/Advanced 8.0
    • Worry-Free Business Security Standard/Advanced 9.0
    • Platform:
    • N/A N/A
Summary

Trend Micro is aware of the soon to be officially announced Linux “GHOST” remote code execution vulnerability (CVE-2015-0235). This vulnerability affects Linux GNU C Library (glibc) versions prior to version 2.18.

Details
Public

Trend Micro is investigating if any of its products and services may be affected and/or are vulnerable. Below is the reviewed VRTS data as of February 3, 2015. This list will continually be updated as the investigation on additional products are completed, as well as information for any patches or solutions required if necessary.

Products that are not affected:

ProductsVersion
Core Protection Module for MacAll versions
Deep SecurityAll versions
InterScan for UnixAll versions
InterScan Messaging Security SuiteAll versions
InterScan VirusWall6.02
ScanMail for IBM Domino5.6
ScanMail for Lotus Domino3.0, 5.0, 5.5
ServerProtect for LinuxAll versions
TitaniumAll versions
Titanium for MacAll versions
Trend Micro Full Disk Encryption5.0, 3.1.3
Trend Micro Security for Mac2
Product affected:
ProductsVersionFix Location
Deep Discovery Advisor3.0 SP1DDA 3.0 SP1 Critical Patch 3093
Deep Discovery Analyzer5.0DDAN 5.0 Critical Patch 1076
InterScan Messaging Virtual Appliance8.0, 8.2, 8.5, 9.0IMSVA 8.0 Critical Patch 15020
IMSVA 8.2 Critical Patch 17670
IMSVA 8.5 Critical Patch 16290
IMSVA 9.0 Critical Patch 15140
Trend Micro Smart Protection Server2.5, 2.6, 3.0TMSPS 2.5 Critical Patch 2197
TMSPS 2.6 Critical Patch 2092
TMSPS 3.0 Critical Patch 1212

Customers and partners who may need some additional information or have questions are encouraged to contact their authorized Trend Micro Technical Support representatives for assistance.

References:

Premium
Internal
Rating:
Category:
Troubleshoot
Solution Id:
1107597
Feedback
Did this article help you?

Thank you for your feedback!

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support


To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.


Need More Help?

Create a technical support case if you need further support.