Trend Micro ServerProtect flaws disclosed

By
Follow google news

Nnumerous boundary vulnerabilities have been disclosed in Trend Micro's ServerProtect product that could allow buffer overflow and DoS attacks.

Trend Micro ServerProtect flaws disclosed
Trend Micro made patches available for the flaws last month. 

One flaw is caused by a stack overflow error when processing specially created RPC requests sent to port 54168/TCP, according to FrSIRT, the French Security Incident Response Team. The flaw could be used to crash the SpntSvc.exe daemon or to execute arbitrary code.

Another flaw is caused by a stack overflow error when handling specially crafted calls sent to port 3628/TCP. That error can be exploited to crash the EarthAgent.exe daemon, according to FrSIRT.

Secunia ranked both flaws as "moderately critical" in a Monday advisory, adding that they affect ServerProtect version 5.58.

Other flaws exist in program functions when processing malformed arguments. They can also be exploited to execute arbitrary code, according to FrSIRT.

Authentication is not required for exploitation of either flaw, according to advisories from TippingPoint’s ZeroDay Initiative. 

Trend Micro patched the flaws, which affect various versions of Windows 2000, Windows NT and Windows 2003, in bulletins released on 18 April.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

NSW Treasury staffer allegedly exfiltrated 5600 sensitive documents

NSW Treasury staffer allegedly exfiltrated 5600 sensitive documents

ANZ Banking Group names acting CISO

ANZ Banking Group names acting CISO

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Cloud deployment firm Vercel breached, advises secrets rotation

Cloud deployment firm Vercel breached, advises secrets rotation

Log In

  |  Forgot your password?