New flaws found in Trend Micro antivirus

Powered by SC Magazine
 

Vulnerabilities acknowledged in server antivirus offerings.

Security vendor Trend Micro has once again found itself patching its own software vulnerabilities. 

The company has warned of a vulnerability in three of its enterprise server antivirus products: ServerProtect for Microsoft Windows, NetApp and EMC servers and databases. 

An attacker on a local network could exploit the vulnerability by sending a malformed network packet targeting ServerProtect's 'StCommon.dll' component.

Once the exploit has been successfully launched, an attacker could remotely execute code on the compromised server.

Trend Micro has issued a fix for the Windows version of the vulnerability in the support section of its website. The EMC and NetApp versions will not be patched until 19 and 29 March respectively, the company said.

Security firm Secunia noted that the attack had to be carried out on a local network, and rated the vulnerability as 'moderately critical' despite the possibility for remote code execution. 

Secunia recommends that users install the patches as soon as they are available.

This is the second time in two weeks that Trend Micro, which makes its money plugging others' security holes, has had to patch vulnerabilities in its own software.

Earlier this month, the company issued a patch for a vulnerability that affected more than 30 of its security products.

Copyright ©v3.co.uk


New flaws found in Trend Micro antivirus
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 338

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 143

Vote