Trend Micro ServerProtect flaws disclosed

By
Follow google news

Nnumerous boundary vulnerabilities have been disclosed in Trend Micro's ServerProtect product that could allow buffer overflow and DoS attacks.

Trend Micro ServerProtect flaws disclosed
Trend Micro made patches available for the flaws last month. 

One flaw is caused by a stack overflow error when processing specially created RPC requests sent to port 54168/TCP, according to FrSIRT, the French Security Incident Response Team. The flaw could be used to crash the SpntSvc.exe daemon or to execute arbitrary code.

Another flaw is caused by a stack overflow error when handling specially crafted calls sent to port 3628/TCP. That error can be exploited to crash the EarthAgent.exe daemon, according to FrSIRT.

Secunia ranked both flaws as "moderately critical" in a Monday advisory, adding that they affect ServerProtect version 5.58.

Other flaws exist in program functions when processing malformed arguments. They can also be exploited to execute arbitrary code, according to FrSIRT.

Authentication is not required for exploitation of either flaw, according to advisories from TippingPoint’s ZeroDay Initiative. 

Trend Micro patched the flaws, which affect various versions of Windows 2000, Windows NT and Windows 2003, in bulletins released on 18 April.
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Tasmanian gov agencies impacted by cyber attack

Tasmanian gov agencies impacted by cyber attack

Australian chief at US defence contractor L3Harris sold exploits to Russia

Australian chief at US defence contractor L3Harris sold exploits to Russia

Vic gov agencies flying blind on server security, audit finds

Vic gov agencies flying blind on server security, audit finds

Home Affairs streamlines risk vetting for gov tech suppliers

Home Affairs streamlines risk vetting for gov tech suppliers

Log In

  |  Forgot your password?