| Vulnerability Name: | CVE-2005-1929 (CCN-23600) | ||||||||
| Assigned: | 2005-12-14 | ||||||||
| Published: | 2005-12-14 | ||||||||
| Updated: | 2011-03-07 | ||||||||
| Summary: | Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via "wrapped" length values in Chunked transfer requests. Note: the original report suggests that the relay.dll issue is related to a problem in which a Microsoft Foundation Classes (MFC) static library returns invalid values under heavy load. As such, this might not be a vulnerability in Trend Micro's product. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
| Vulnerability Type: | CWE-119 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2005-1929 Source: FULLDISC Type: UNKNOWN 20051214 Re: iDefense Security Advisory 12.14.05: Trend Micro ServerProtect relay.dll Chunked Overflow Vulnerability Source: FULLDISC Type: UNKNOWN 20051214 Re: iDefense Security Advisory 12.14.05: Trend Micro ServerProtect relay.dll Chunked Overflow Vulnerability Source: CCN Type: SA18038 Trend Micro ServerProtect Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 18038 Source: SREASON Type: UNKNOWN 256 Source: SREASON Type: UNKNOWN 257 Source: CCN Type: SECTRACK ID: 1015358 Trend Micro ServerProtect Buffer Overflows and Other Bugs Permit Remote Code Execution, Denial of Service, and File Disclosure Source: SECTRACK Type: UNKNOWN 1015358 Source: IDEFENSE Type: Vendor Advisory 20051214 Trend Micro ServerProtect isaNVWRequest.dll Chunked Overflow Source: CCN Type: iDEFENSE Security Advisory 12.14.05 Trend Micro ServerProtect relay.dll Chunked Overflow Vulnerability Source: OSVDB Type: UNKNOWN 21771 Source: OSVDB Type: UNKNOWN 21772 Source: CCN Type: OSVDB ID: 21771 Trend Micro ServerProtect isaNVWRequest.dll POST Request Remote Overflow Source: CCN Type: OSVDB ID: 21772 Trend Micro ServerProtect relay.dll POST Request Remote Overflow Source: BID Type: UNKNOWN 15865 Source: CCN Type: BID-15865 Trend Micro ServerProtect ISANVWRequest Heap Overflow Vulnerability Source: BID Type: UNKNOWN 15866 Source: CCN Type: BID-15866 Trend Micro ServerProtect Relay Heap Overflow Vulnerability Source: CCN Type: Trend Micro Web site ServerProtect for Microsoft Windows/Novell NetWare Source: VUPEN Type: Vendor Advisory ADV-2005-2907 Source: XF Type: UNKNOWN serverprotect-relay-bo(23600) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| Vulnerability Name: | CVE-2005-1929 (CCN-23602) | ||||||||
| Assigned: | 2005-12-14 | ||||||||
| Published: | 2005-12-14 | ||||||||
| Updated: | 2011-03-07 | ||||||||
| Summary: | Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via "wrapped" length values in Chunked transfer requests. Note: the original report suggests that the relay.dll issue is related to a problem in which a Microsoft Foundation Classes (MFC) static library returns invalid values under heavy load. As such, this might not be a vulnerability in Trend Micro's product. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
| Vulnerability Type: | CWE-119 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2005-1929 Source: CCN Type: SA18038 Trend Micro ServerProtect Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1015358 Trend Micro ServerProtect Buffer Overflows and Other Bugs Permit Remote Code Execution, Denial of Service, and File Disclosure Source: CCN Type: iDEFENSE Security Advisory 12.14.05 Trend Micro ServerProtect isaNVWRequest.dll Chunked Overflow Source: CCN Type: OSVDB ID: 21771 Trend Micro ServerProtect isaNVWRequest.dll POST Request Remote Overflow Source: CCN Type: OSVDB ID: 21772 Trend Micro ServerProtect relay.dll POST Request Remote Overflow Source: CCN Type: BID-15865 Trend Micro ServerProtect ISANVWRequest Heap Overflow Vulnerability Source: CCN Type: BID-15866 Trend Micro ServerProtect Relay Heap Overflow Vulnerability Source: CCN Type: Trend Micro Web site ServerProtect for Microsoft Windows/Novell NetWare Source: XF Type: UNKNOWN serverprotect-isanvwrequest-bo(23602) | ||||||||
| BACK | |||||||||