Trend Micro ServerProtect TmRpcSrv.dll RPC Request Multiple Overflows

critical Nessus Plugin ID 24680

Synopsis

It is possible to execute code on the remote host through the AntiVirus Agent.

Description

The remote version of Trend Micro ServerProtect is vulnerable to multiple stack overflows in the RPC interface. By sending specially crafted requests to the remote host, an attacker may be able to exploit stack based overflows and execute arbitrary code on the remote host.

Solution

Trend Micro has released a patch for ServerProtect for Windows / NetWare.

See Also

http://www.nessus.org/u?0afdbfea

http://www.nessus.org/u?6212c055

http://www.trendmicro.com/download/product.asp?productid=17

Plugin Details

Severity: Critical

ID: 24680

File Name: trendmicro_serverprotect_multiple.nasl

Version: 1.22

Type: remote

Published: 2/21/2007

Updated: 8/1/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:trend_micro:serverprotect

Required KB Items: Antivirus/TrendMicro/ServerProtect

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/20/2007

Vulnerability Publication Date: 2/20/2007

Exploitable With

CANVAS (CANVAS)

Metasploit (Trend Micro ServerProtect 5.58 Buffer Overflow)

ExploitHub (EH-12-206)

Reference Information

CVE: CVE-2007-1070

BID: 22639