---------------------------------------------------------------------- Do you need accurate and reliable IDS / IPS / AV detection rules? Get in-depth vulnerability details: http://secunia.com/binary_analysis/sample_analysis/ ---------------------------------------------------------------------- TITLE: Trend Micro ServerProtect Multiple Vulnerabilities SECUNIA ADVISORY ID: SA32618 VERIFY ADVISORY: http://secunia.com/advisories/32618/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From local network SOFTWARE: Trend Micro ServerProtect for Windows/NetWare 5.x http://secunia.com/advisories/product/1153/ Trend Micro ServerProtect for EMC Celerra 5.x http://secunia.com/advisories/product/13528/ Trend Micro ServerProtect for Network Appliance Filer 5.x http://secunia.com/advisories/product/13527/ DESCRIPTION: Some vulnerabilities have been reported in Trend Micro ServerProtect, which potentially can be exploited by malicious people to compromise a vulnerable system. 1) An error in the RPC authentication process can be exploited to gain administrative access to the RPC interface. 2) Multiple errors in the implementation of unspecified RPC procedures can be exploited to cause heap-based buffer overflows. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in versions 5.7 and 5.58. Other versions may also be affected. SOLUTION: Restrict network access to the product. PROVIDED AND/OR DISCOVERED BY: 1) David Dewey of ISS X-Force 2) David Dewey and Chris Valasek of ISS X-Force ORIGINAL ADVISORY: ISS X-Force: http://www.iss.net/threats/307.html http://www.iss.net/threats/308.html http://www.iss.net/threats/309.html http://www.iss.net/threats/310.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------