Copyright 2024 - CSIM - Asian Institute of Technology

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Subject: US-CERT Technical Cyber Security Alert TA07-235A -- Trend Micro ServerProtect Contains Multiple Vulnerabilities
From: CERT Advisory <This email address is being protected from spambots. You need JavaScript enabled to view it.>
Date: Thu, 23 Aug 2007 15:54:55 -0400

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                        National Cyber Alert System

                 Technical Cyber Security Alert TA07-235A

Trend Micro ServerProtect Contains Multiple Vulnerabilities

   Original release date: August 23, 2007
   Last revised: --
   Source: US-CERT

Systems Affected

     * Trend Micro ServerProtect for Windows/Novell Netware

Overview

   A number of vulnerabilities exist in the Trend Micro ServerProtect
   antivirus product. These vulnerabilities could allow a remote attacker
   to completely compromise an affected system.

I. Description

   Multiple buffer overflow vulnerabilities and an integer overflow
   vulnerability have been discovered in the RPC interfaces used by
   various components in Trend Micro's ServerProtect software package.
   These vulnerabilities could be exploited by a remote attacker with the
   ability to supply a specially crafted RPC request to the system
   running the affected software.

   Further information about the vulnerabilities is available in the
   Vulnerability Notes Database.

II. Impact

   A remote, unauthenticated attacker could execute arbitrary code on a
   vulnerable system. The attacker-supplied code would be executed with
   system privileges, resulting in a complete compromise of the affected
   system.

III. Solution

Apply updates from Trend Micro

   Trend Micro has provided an update for these vulnerabilities in

          ServerProtect 5.58 for Windows NT/2000/2003 Security Patch 4 -
          Build 1185

   Administrators are encouraged to review this notice and apply the
   patch as soon as possible.

Restrict network access to the affected components

   Until the patch can be applied, administrators may wish to block
   access to the vulnerable software from outside their network
   perimeters, specifically by blocking access to the ports used by the
   ServerProtect service (5186/tcp) and the ServerProtect Agent service
   (3628/tcp). This will limit exposure to attacks; however, attackers
   within the network perimeter could still exploit the vulnerabilities.

IV. References

     * US-CERT Vulnerability Notes for Trend Micro ServerProtect Security
       Patch 4 -
       <http://www.kb.cert.org/vuls/byid?searchview&query=spnt_558_win_en_securitypatch4>
     * README for Trend Micro ServerProtect 5.58 for Windows NT/2000/2003
       Security Patch 4 - Build 1185 -
       <http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt> 

 ____________________________________________________________________

   The most recent version of this document can be found at:

     <http://www.us-cert.gov/cas/techalerts/TA07-235A.html>
 ____________________________________________________________________

   Feedback can be directed to US-CERT Technical Staff. Please send
   email to <This email address is being protected from spambots. You need JavaScript enabled to view it.> with "TA07-235A Feedback VU#959400" in the
   subject.
 ____________________________________________________________________

   For instructions on subscribing to or unsubscribing from this
   mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
 ____________________________________________________________________

   Produced 2007 by US-CERT, a government organization.

   Terms of use:

     <http://www.us-cert.gov/legal.html>
 ____________________________________________________________________


Revision History

   August 23, 2007: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRs3klPRFkHkM87XOAQL7zAf+PXpaSnXpigRzucYQBATk81xcjzQXhoQx
HSGK1rJfxF6rQfyP/KpoBxMLLVvFkPbixK/Q2Cc3h5SGRzLPk6KANXIW+dJ3lMVl
q0DHKdr8MLtczp+rQv8Dzhwoi+AT1DYmlqEnW0Rb1X5vSK26y1tUNbrIPmVocpIK
DcxFVuFS7NEBIgQEopnZn4cXq59uavjuNR9QMFfekZcM1dMvxkYEG46fY9oggSdD
DPHqg9fkfTZ8ARnzy44L6PMMkRtOTIdCOCfmTj/leC8Y+HggScZ2SziV3CxKvJVZ
2dCMGMkoPlPujqQxgR1L5DAT47KVYR5QbzbVqTFsUiNYH4pJ4W5G1g==
=v2XA
-----END PGP SIGNATURE-----
Powered by: MHonArc

Login Form

Search

School of Engineering and technologies     Asian Institute of Technology