Trend Micro ServerProtect flaws disclosed

By

Nnumerous boundary vulnerabilities have been disclosed in Trend Micro's ServerProtect product that could allow buffer overflow and DoS attacks.

Trend Micro ServerProtect flaws disclosed
Trend Micro made patches available for the flaws last month. 

One flaw is caused by a stack overflow error when processing specially created RPC requests sent to port 54168/TCP, according to FrSIRT, the French Security Incident Response Team. The flaw could be used to crash the SpntSvc.exe daemon or to execute arbitrary code.

Another flaw is caused by a stack overflow error when handling specially crafted calls sent to port 3628/TCP. That error can be exploited to crash the EarthAgent.exe daemon, according to FrSIRT.

Secunia ranked both flaws as "moderately critical" in a Monday advisory, adding that they affect ServerProtect version 5.58.

Other flaws exist in program functions when processing malformed arguments. They can also be exploited to execute arbitrary code, according to FrSIRT.

Authentication is not required for exploitation of either flaw, according to advisories from TippingPoint’s ZeroDay Initiative. 

Trend Micro patched the flaws, which affect various versions of Windows 2000, Windows NT and Windows 2003, in bulletins released on 18 April.
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Greater Western Water's billing system data issues laid bare

Greater Western Water's billing system data issues laid bare

Microsoft plans full quantum-resistant cryptography transition by 2033

Microsoft plans full quantum-resistant cryptography transition by 2033

Attackers weaponise Linux file names as malware vectors

Attackers weaponise Linux file names as malware vectors

Log In

  |  Forgot your password?