From Secunia:

Description:
Two vulnerabilities have been reported in Trend Micro ServerProtect, which can be exploited by malicious people to compromise a vulnerable system.

1) A boundary error within the EarthAgent.exe service can be exploited to cause a stack-based buffer overflow via a specially crafted RPC request to the said service (default port 3628/TCP).

2) A boundary error within the “CAgRpcClient::CreateBinding()” function in AgRpcCln.dll can be exploited to cause a stack-based buffer overflow via a specially crafted RPC request to the SpntSvc.exe service (default port 5168/TCP).

Successful exploitation of the vulnerabilities allows execution of arbitrary code.

The vulnerabilities reportedly affect version 5.58.

Solution:
Apply patches.
http://www.trendmicro.com/download_beta/product.asp?productid=17

Article Link

UPDATE: Turns out there may be active exploitation of this one underway.

[tags]Trend Micro Vulnerability, Buffer Overflows, Security Advisory[/tags]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.