Vulnerability CVE-2005-1929


Published: 2005-12-14   Modified: 2012-02-12

Description:
Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via "wrapped" length values in Chunked transfer requests. NOTE: the original report suggests that the relay.dll issue is related to a problem in which a Microsoft Foundation Classes (MFC) static library returns invalid values under heavy load. As such, this might not be a vulnerability in Trend Micro's product.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Trend Micro ServerProtect relay.dll Chunked Overflow Vulnerability
iDEFENSE Labs
14.12.2005
Med.
Trend Micro ServerProtect isaNVWRequest.dll Chunked Overflow
iDEFENSE Labs
14.12.2005

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Trend micro -> Serverprotect 

 References:
http://www.vupen.com/english/advisories/2005/2907
http://www.securityfocus.com/bid/15866
http://www.securityfocus.com/bid/15865
http://www.osvdb.org/21772
http://www.osvdb.org/21771
http://www.idefense.com/application/poi/display?id=353&type=vulnerabilities
http://securitytracker.com/id?1015358
http://securityreason.com/securityalert/257
http://securityreason.com/securityalert/256
http://secunia.com/advisories/18038
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039978.html
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039972.html

Copyright 2024, cxsecurity.com

 

Back to Top