Trend.Micro.ServerProtect.SPNTSVC.Buffer.Overflow
Description
This indicates an attack attempt against multiple stack-based buffer-overflow vulnerabilities in Trend Micro ServerProtect.
The vulnerabilities are caused by the application's failure to properly sanitize user input before copying to a smaller sized buffer. Successful exploitation could allow remote attackers to execute arbitrary code on the system with SYSTEM privileges.
Affected Products
Trend Micro ServerProtect for Windows version 5.58
Trend Micro ServerProtect for EMC version 5.58
Trend Micro ServerProtect for Network Appliance Filer version 5.61
Trend Micro ServerProtect for Network Appliance Filer version 5.62
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the patch, available from the vendor's web site:
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2023-08-01 | 25.612 | Name:TrendMicro. ServerProtect. SPNTSVC. Buffer. Overflow:Trend. Micro. ServerProtect. SPNTSVC. Buffer. Overflow |