{"vuid":"VU#768681","idnumber":"768681","name":"Trend Micro ServerProtect contains multiple vulnerabilities","keywords":[""],"overview":"Trend Micro ServerProtect contains multiple vulnerabilities. The most severe of these vulnerabilities may allow an attacker to execute commands, view sensitive data, or cause a system to crash.","clean_desc":"Trend Micro ServerProtect is designed to detect and remove viruses from files. ServerProtect contains vulnerabilities, including multiple heap overflows. For more information on  these issues see: IBM X-Force Alert 307 -  Trend Micro ServerProtect Unauthenticated Remote Administration\nIBM X-Force Alert 308 - Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflow\nIBM X-Force Alert 309 - Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3)\nIBM X-Force Alert 310 - Trend Micro ServerProtect [PROCEDURE NAME REDACTED] Heap Overflows (3) Note that these issues affect Trend Micro ServerProtect versions 5.58 and 5.7.","impact":"A remote, unauthenticated attacker may be able to gain access with the privileges of the ServerProtect account or an administrator account and execute arbitrary commands, view log files or other sensitive data, or cause a vulnerable system to crash.","resolution":"We are currently unaware of a complete solution to this problem. According to IBM X-Force: A patch released in May 2008 somewhat mitigates access to this vulnerability. However, the vulnerability is still resident and easily accessible.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by David Dewey and Chris Valasek of \nIBM X-Force","author":"This document was written by Chris Taschner.","public":["http://www.iss.net/threats/307.html","http://www.iss.net/threats/308.html","http://www.iss.net/threats/309.html","http://www.iss.net/threats/310.html","http://www.trendmicro.com/download/product.asp?productid=17","http://blogs.iss.net/archive/trend.html"],"cveids":["CVE-2006-5268","CVE-2006-5269","CVE-2007-0072","CVE-2007-0073","CVE-2007-0074","CVE-2008-0012","CVE-2008-0013","CVE-2008-0014"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-05-02T21:30:41Z","publicdate":"2008-11-11T00:00:00Z","datefirstpublished":"2008-11-13T14:07:58Z","dateupdated":"2008-11-25T14:40:09Z","revision":19,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"4","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"7","cam_impact":"20","cam_easeofexploitation":"14","cam_attackeraccessrequired":"19","cam_scorecurrent":"17.45625","cam_scorecurrentwidelyknown":"20.9475","cam_scorecurrentwidelyknownexploited":"34.9125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":17.45625,"vulnote":null}