Lucene search

K
zdiSebastian Apelt ([email protected])ZDI-07-051
HistorySep 07, 2007 - 12:00 a.m.

Trend Micro ServerProtect TMregChange() Stack Overflow Vulnerability

2007-09-0700:00:00
Sebastian Apelt ([email protected])
www.zerodayinitiative.com
8

EPSS

0.948

Percentile

99.3%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Server Protect. Authentication is not required to exploit this vulnerability. The specific flaw exists within the routine TMregChange() exported by TMReg.dll which is reachable through the custom protocol subcode “\x15\x00\x00\x00”. The TCP socket bound to port 5005 receives user-supplied data which is copied without proper bounds checking to a stack-based buffer. Thereby resulting in an exploitable condition.