From Secunia:

Description:
TippingPoint Security Research Team has reported some vulnerabilities in Trend Micro ServerProtect, which can be exploited by malicious people to compromise a vulnerable system.

1) A boundary error within the “CMON_NetTestConnection()” function in StCommon.dll can be exploited to cause a stack-based buffer overflow via a specially crafted RPC request to the SpntSvc.exe service (default port 5168/TCP).

2) Another boundary error within a function in StCommon.dll can be exploited to cause a stack-based buffer overflow via a specially crafted RPC request to the SpntSvc.exe service.

3) A boundary error within the “ENG_SendEMail()” function in eng50.dll can be exploited to cause a stack-based buffer overflow via a specially crafted RPC request to the SpntSvc.exe service.

4) Another boundary error within a function in eng50.dll can be exploited to cause a stack-based buffer overflow via a specially crafted RPC request to the SpntSvc.exe service.

Successful exploitation of the vulnerabilities allows execution of arbitrary code with SYSTEM privileges.

The vulnerabilities are reported in the following versions:
* ServerProtect for Windows 5.58
* ServerProtect for EMC 5.58
* ServerProtect for Network Appliance Filer 5.61
* ServerProtect for Network Appliance Filer 5.62

Article Link

[tags]Trend Micro, ServerProtect, Buffer Overflow[/tags]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.