Trend Micro ServerProtect Multiple Remote Overflows

critical Nessus Plugin ID 25925

Synopsis

It is possible to execute code on the remote host through the AntiVirus Agent.

Description

The remote version of Trend Micro ServerProtect is vulnerable to multiple buffer overflows in the RPC interface. By sending specially crafted requests to the remote host, an attacker may be able to exploit those overflows and execute arbitrary code on the remote host with SYSTEM privileges.

Solution

Trend Micro has released a patch for ServerProtect for Windows / NetWare.

See Also

http://www.nessus.org/u?ad66593b

http://www.nessus.org/u?4e9da692

http://www.trendmicro.com/download/product.asp?productid=17

Plugin Details

Severity: Critical

ID: 25925

File Name: trendmicro_serverprotect_multiple2.nasl

Version: 1.23

Type: remote

Agent: windows

Family: Windows

Published: 8/22/2007

Updated: 8/1/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:trend_micro:serverprotect

Required KB Items: Antivirus/TrendMicro/ServerProtect

Exploit Ease: No known exploits are available

Patch Publication Date: 7/27/2007

Exploitable With

ExploitHub (EH-12-229)

Reference Information

CVE: CVE-2007-4218, CVE-2007-4219, CVE-2007-4731

BID: 25395, 25396, 25595

CWE: 119, 189, 20