Nnumerous boundary vulnerabilities have been disclosed in Trend Micro’s ServerProtect product that could allow buffer overflow and DoS attacks.
Trend Micro made patches available for the flaws last month.
One flaw is caused by a stack overflow error when processing specially created RPC requests sent to port 54168/TCP, according to FrSIRT, the French Security Incident Response Team. The flaw could be used to crash the SpntSvc.exe daemon or to execute arbitrary code.
Another flaw is caused by a stack overflow error when handling specially crafted calls sent to port 3628/TCP. That error can be exploited to crash the EarthAgent.exe daemon, according to FrSIRT.
Other flaws exist in program functions when processing malformed arguments. They can also be exploited to execute arbitrary code, according to FrSIRT.
Click here to email Online Editor Frank Washkuch Jr.