New flaws found in Trend Micro antivirus

Powered by SC Magazine
 

Vulnerabilities acknowledged in server antivirus offerings.

Security vendor Trend Micro has once again found itself patching its own software vulnerabilities. 

The company has warned of a vulnerability in three of its enterprise server antivirus products: ServerProtect for Microsoft Windows, NetApp and EMC servers and databases. 

An attacker on a local network could exploit the vulnerability by sending a malformed network packet targeting ServerProtect's 'StCommon.dll' component.

Once the exploit has been successfully launched, an attacker could remotely execute code on the compromised server.

Trend Micro has issued a fix for the Windows version of the vulnerability in the support section of its website. The EMC and NetApp versions will not be patched until 19 and 29 March respectively, the company said.

Security firm Secunia noted that the attack had to be carried out on a local network, and rated the vulnerability as 'moderately critical' despite the possibility for remote code execution. 

Secunia recommends that users install the patches as soon as they are available.

This is the second time in two weeks that Trend Micro, which makes its money plugging others' security holes, has had to patch vulnerabilities in its own software.

Earlier this month, the company issued a patch for a vulnerability that affected more than 30 of its security products.

Copyright ©v3.co.uk


New flaws found in Trend Micro antivirus
 
 
 
Top Stories
Matching databases to Linux distros
Reviewed: OS-repository DBMSs, MariaDB vs MySQL.
 
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  71%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 762

Vote