Security vendor Trend Micro has once again found itself patching its own software vulnerabilities.
The company has warned of a vulnerability in three of its enterprise server antivirus products: ServerProtect for Microsoft Windows, NetApp and EMC servers and databases.
An attacker on a local network could exploit the vulnerability by sending a malformed network packet targeting ServerProtect's 'StCommon.dll' component.
Once the exploit has been successfully launched, an attacker could remotely execute code on the compromised server.
Trend Micro has issued a fix for the Windows version of the vulnerability in the support section of its website. The EMC and NetApp versions will not be patched until 19 and 29 March respectively, the company said.
Security firm Secunia noted that the attack had to be carried out on a local network, and rated the vulnerability as 'moderately critical' despite the possibility for remote code execution.
Secunia recommends that users install the patches as soon as they are available.
This is the second time in two weeks that Trend Micro, which makes its money plugging others' security holes, has had to patch vulnerabilities in its own software.
Earlier this month, the company issued a patch for a vulnerability that affected more than 30 of its security products.
New flaws found in Trend Micro antivirus
By Shaun Nichols, vnunet on Feb 23, 2007 10:23AM