Trend.Micro.ServerProtect.SPNTSVC.Buffer.Overflow

description-logoDescription

This indicates an attack attempt against multiple stack-based buffer-overflow vulnerabilities in Trend Micro ServerProtect.
The vulnerabilities are caused by the application's failure to properly sanitize user input before copying to a smaller sized buffer. Successful exploitation could allow remote attackers to execute arbitrary code on the system with SYSTEM privileges.

affected-products-logoAffected Products

Trend Micro ServerProtect for Windows version 5.58
Trend Micro ServerProtect for EMC version 5.58
Trend Micro ServerProtect for Network Appliance Filer version 5.61
Trend Micro ServerProtect for Network Appliance Filer version 5.62

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the patch, available from the vendor's web site:

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-08-01 25.612 Name:TrendMicro.
ServerProtect.
SPNTSVC.
Buffer.
Overflow:Trend.
Micro.
ServerProtect.
SPNTSVC.
Buffer.
Overflow