Trend Micro's ServerProtect executes injected code
Trend Micro's ServerProtect anti-virus solution contains vulnerabilities which can be exploited by attackers to execute their own code on affected systems. The Zero Day Initiative has reported bugs in two components of the software which listen for incoming connections and are therefore remotely exploitable.
The current version of ServerProtect, version 5.58, is affected. Trend Micro has made updates available to fix the security vulnerabilities. Administrators of ServerProtect installations should install these as soon as possible.
Non-authenticated attackers can provoke a buffer overflow in the EarthAgent.exe component, which listens on port 3628 using Remote Procedure Call (RPC). A comparable bug is present in the SpntSvc.exe service, which is by default accessible from the outside world via port 5168.
- Trend Micro ServerProtect EarthAgent Stack Overflow Vulnerability, security advisory from the Zero Day Initiative
- Trend Micro ServerProtect AgRpcCln.dll Stack Overflow Vulnerability, security advisory from the Zero Day Initiative
- Download the ServerProtect updates