Lucene search

K
certCERTVU:768681
HistoryNov 13, 2008 - 12:00 a.m.

Trend Micro ServerProtect contains multiple vulnerabilities

2008-11-1300:00:00
www.kb.cert.org
12

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.097

Percentile

94.8%

Overview

Trend Micro ServerProtect contains multiple vulnerabilities. The most severe of these vulnerabilities may allow an attacker to execute commands, view sensitive data, or cause a system to crash.

Description

Trend Micro ServerProtect is designed to detect and remove viruses from files. ServerProtect contains vulnerabilities, including multiple heap overflows. For more information on these issues see:

* [IBM X-Force Alert 307 - Trend Micro ServerProtect Unauthenticated Remote Administration](<http://www.iss.net/threats/307.html>)
* [IBM X-Force Alert 308 - Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflow](<http://www.iss.net/threats/308.html>)
* [IBM X-Force Alert 309 - Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3)](<http://www.iss.net/threats/309.html>)
* [IBM X-Force Alert 310 - Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3)](<http://www.iss.net/threats/310.html>)

Note that these issues affect Trend Micro ServerProtect versions 5.58 and 5.7.

Impact

A remote, unauthenticated attacker may be able to gain access with the privileges of the ServerProtect account or an administrator account and execute arbitrary commands, view log files or other sensitive data, or cause a vulnerable system to crash.


Solution

We are currently unaware of a complete solution to this problem. According to IBM X-Force:
A patch released in May 2008 somewhat mitigates access to this vulnerability. However, the vulnerability is still resident and easily accessible.


Vendor Information

768681

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Trend Micro __ Affected

Notified: August 08, 2008 Updated: November 13, 2008

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

Trend Micro has released a patch to address this issue. This patch may not completely address the problems.

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by David Dewey and Chris Valasek of IBM X-Force.

This document was written by Chris Taschner.

Other Information

CVE IDs: CVE-2006-5268, CVE-2006-5269, CVE-2007-0072, CVE-2007-0073, CVE-2007-0074, CVE-2008-0012, CVE-2008-0013, CVE-2008-0014
Severity Metric: 17.46 Date Public:

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.097

Percentile

94.8%