All the vulnerabilites related to Trend Micro - Trend Micro ServerProtect for Linux
cve-2020-28575
Vulnerability from cvelistv5
Published
2020-12-01 18:40
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000281950 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1378/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro ServerProtect for Linux |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:40:58.911Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000281950" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1378/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro ServerProtect for Linux", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow Privilege Escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-01T18:40:37", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000281950" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1378/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-28575", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro ServerProtect for Linux", "version": { "version_data": [ { "version_value": "3.0" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow Privilege Escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000281950", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000281950" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1378/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1378/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-28575", "datePublished": "2020-12-01T18:40:38", "dateReserved": "2020-11-12T00:00:00", "dateUpdated": "2024-08-04T16:40:58.911Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24561
Vulnerability from cvelistv5
Published
2020-09-15 20:00
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000268419 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro ServerProtect for Linux |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:19:07.396Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000268419" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro ServerProtect for Linux", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Command Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-15T20:00:16", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000268419" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2020-24561", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro ServerProtect for Linux", "version": { "version_data": [ { "version_value": "3.0" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000268419", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000268419" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2020-24561", "datePublished": "2020-09-15T20:00:16", "dateReserved": "2020-08-20T00:00:00", "dateUpdated": "2024-08-04T15:19:07.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25224
Vulnerability from cvelistv5
Published
2021-01-27 19:10
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284207 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-085/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro ServerProtect for Linux |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.064Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284207" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-085/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro ServerProtect for Linux", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Exhaustion DOS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-27T19:10:24", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284207" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-085/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25224", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro ServerProtect for Linux", "version": { "version_data": [ { "version_value": "3.0" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Exhaustion DOS" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284207", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284207" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-085/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-085/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25224", "datePublished": "2021-01-27T19:10:24", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.064Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25225
Vulnerability from cvelistv5
Published
2021-01-27 19:10
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284207 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-086/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro ServerProtect for Linux |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.151Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284207" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-086/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro ServerProtect for Linux", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Exhaustion DOS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-27T19:10:24", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284207" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-086/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro ServerProtect for Linux", "version": { "version_data": [ { "version_value": "3.0" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Exhaustion DOS" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284207", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284207" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-086/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-086/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25225", "datePublished": "2021-01-27T19:10:24", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.151Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-25226
Vulnerability from cvelistv5
Published
2021-01-27 19:10
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284207 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-087/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Trend Micro | Trend Micro ServerProtect for Linux |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:56:11.095Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://success.trendmicro.com/solution/000284207" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-087/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Trend Micro ServerProtect for Linux", "vendor": "Trend Micro", "versions": [ { "status": "affected", "version": "3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Exhaustion DOS", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-01-27T19:10:25", "orgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "shortName": "trendmicro" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://success.trendmicro.com/solution/000284207" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-087/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@trendmicro.com", "ID": "CVE-2021-25226", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Trend Micro ServerProtect for Linux", "version": { "version_data": [ { "version_value": "3.0" } ] } } ] }, "vendor_name": "Trend Micro" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Exhaustion DOS" } ] } ] }, "references": { "reference_data": [ { "name": "https://success.trendmicro.com/solution/000284207", "refsource": "MISC", "url": "https://success.trendmicro.com/solution/000284207" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-087/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-087/" } ] } } } }, "cveMetadata": { "assignerOrgId": "7f7bd7df-cffe-4fdb-ab6d-859363b89272", "assignerShortName": "trendmicro", "cveId": "CVE-2021-25226", "datePublished": "2021-01-27T19:10:25", "dateReserved": "2021-01-15T00:00:00", "dateUpdated": "2024-08-03T19:56:11.095Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }