Vulnerabilites related to trendmicro - serverprotect
var-202103-1322
Vulnerability from variot
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file. plural Trend Micro The product contains a resource depletion vulnerability.Denial of service (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202103-1322", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "deep security", scope: "eq", trust: 1, vendor: "trendmicro", version: "12.0", }, { model: "interscan web security virtual appliance", scope: "eq", trust: 1, vendor: "trendmicro", version: "6.5", }, { model: "serverprotect for network appliance filers", scope: "eq", trust: 1, vendor: "trendmicro", version: "5.8", }, { model: "deep security", scope: "eq", trust: 1, vendor: "trendmicro", version: "20.0", }, { model: "apex one", scope: "eq", trust: 1, vendor: "trendmicro", version: "2019", }, { model: "scanmail", scope: "eq", trust: 1, vendor: "trendmicro", version: "14.0", }, { model: "serverprotect for storage", scope: "eq", trust: 1, vendor: "trendmicro", version: "6.0", }, { model: "scanmail for ibm domino", scope: "eq", trust: 1, vendor: "trendmicro", version: "5.8", }, { model: "apex one", scope: "eq", trust: 1, vendor: "trendmicro", version: null, }, { model: "interscan messaging security virtual appliance", scope: "eq", trust: 1, vendor: "trendmicro", version: "9.1", }, { model: "deep discovery inspector", scope: "eq", trust: 1, vendor: "trendmicro", version: "3.8", }, { model: "cloud edge", scope: "eq", trust: 1, vendor: "trendmicro", version: "5.0", }, { model: "safe lock", scope: "eq", trust: 1, vendor: "trendmicro", version: "1.1", }, { model: "officescan", scope: "eq", trust: 1, vendor: "trendmicro", version: null, }, { model: "worry-free business security", scope: "eq", trust: 1, vendor: "trendmicro", version: "10.1", }, { model: "deep security", scope: "eq", trust: 1, vendor: "trendmicro", version: "10.0", }, { model: "deep discovery analyzer", scope: "eq", trust: 1, vendor: "trendmicro", version: "5.1", }, { model: "control manager", scope: "eq", trust: 1, vendor: "trendmicro", version: "7.0", }, { model: "apex central", scope: "eq", trust: 1, vendor: "trendmicro", version: "2019", }, { model: "deep security", scope: "eq", trust: 1, vendor: "trendmicro", version: "11.0", }, { model: "portal protect", scope: "eq", trust: 1, vendor: "trendmicro", version: "2.6", }, { model: "deep discovery email inspector", scope: "eq", trust: 1, vendor: "trendmicro", version: "2.5", }, { model: "serverprotect", scope: "eq", trust: 1, vendor: "trendmicro", version: "5.8", }, { model: "apex one", scope: null, trust: 0.8, vendor: "トレンドマイクロ", version: null, }, { model: "trend micro control manager", scope: null, trust: 0.8, vendor: "トレンドマイクロ", version: null, }, { model: "deep discovery inspector", scope: null, trust: 0.8, vendor: "トレンドマイクロ", version: null, }, { model: "interscan messaging security virtual appliance", scope: null, trust: 0.8, vendor: "トレンドマイクロ", version: null, }, { model: "cloud edge", scope: null, trust: 0.8, vendor: "トレンドマイクロ", version: null, }, { model: "trend micro deep security", scope: null, trust: 0.8, vendor: "トレンドマイクロ", version: null, }, { model: "deep discovery analyzer", scope: null, trust: 0.8, vendor: "トレンドマイクロ", version: null, }, { model: "deep discovery email inspector", scope: null, trust: 0.8, vendor: "トレンドマイクロ", version: null, }, { model: "trendmicro interscan web security virtual appliance", scope: null, trust: 0.8, vendor: "トレンドマイクロ", version: null, }, { model: "apex central", scope: null, trust: 0.8, vendor: "トレンドマイクロ", version: null, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-004941", }, { db: "NVD", id: "CVE-2021-25252", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:apex_one:2019:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:apex_one:2019:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:cloud_edge:5.0:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:apex_one:-:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:apex_one:-:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:deep_security:10.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:trendmicro:deep_security:11.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:trendmicro:deep_security:12.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:a:trendmicro:deep_security:20.0:-:*:*:long_term_support:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:control_manager:7.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:control_manager:7.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:deep_discovery_analyzer:5.1:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:deep_discovery_email_inspector:2.5:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:deep_discovery_inspector:3.8:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.1:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:interscan_web_security_virtual_appliance:6.5:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:officescan:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:officescan:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:portal_protect:2.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:portal_protect:2.6:*:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:scanmail:14.0:*:*:*:*:microsoft_exchange:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:scanmail:14.0:*:*:*:*:microsoft_exchange:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:scanmail_for_ibm_domino:5.8:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:scanmail_for_ibm_domino:5.8:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:serverprotect_for_storage:6.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:serverprotect_for_storage:6.0:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:serverprotect:5.8:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:emc:celerra_network_attached_storage:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:o:novell:netware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:serverprotect:5.8:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:h:emc:celerra_network_attached_storage:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, { cpe23Uri: "cpe:2.3:o:novell:netware:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:serverprotect_for_network_appliance_filers:5.8:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:netapp:cluster_data_ontap:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:serverprotect_for_network_appliance_filers:5.8:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:netapp:cluster_data_ontap:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:safe_lock:1.1:-:*:*:txone:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:safe_lock:1.1:-:*:*:txone:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:worry-free_business_security:10.1:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [ { cpe23Uri: "cpe:2.3:a:trendmicro:worry-free_business_security:10.1:-:*:*:*:*:*:*", cpe_name: [], vulnerable: true, }, { cpe23Uri: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2021-25252", }, ], }, cve: "CVE-2021-25252", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: null, accessComplexity: "Low", accessVector: "Local", authentication: "None", author: "NVD", availabilityImpact: "Complete", baseScore: 4.9, confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2021-25252", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 1.8, userInteractionRequired: null, vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 1.8, id: "CVE-2021-25252", impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 5.5, baseSeverity: "Medium", confidentialityImpact: "None", exploitabilityScore: null, id: "CVE-2021-25252", impactScore: null, integrityImpact: "None", privilegesRequired: "Low", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2021-25252", trust: 1.8, value: "Medium", }, { author: "CNNVD", id: "CNNVD-202103-242", trust: 0.6, value: "MEDIUM", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-004941", }, { db: "CNNVD", id: "CNNVD-202103-242", }, { db: "NVD", id: "CVE-2021-25252", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file. plural Trend Micro The product contains a resource depletion vulnerability.Denial of service (DoS) It may be put into a state", sources: [ { db: "NVD", id: "CVE-2021-25252", }, { db: "JVNDB", id: "JVNDB-2021-004941", }, ], trust: 1.62, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2021-25252", trust: 2.4, }, { db: "JVN", id: "JVNVU93009588", trust: 0.8, }, { db: "JVNDB", id: "JVNDB-2021-004941", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202103-242", trust: 0.6, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-004941", }, { db: "CNNVD", id: "CNNVD-202103-242", }, { db: "NVD", id: "CVE-2021-25252", }, ], }, id: "VAR-202103-1322", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.29385966, }, last_update_date: "2022-05-04T08:33:12.367000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "000285675", trust: 0.8, url: "https://success.trendmicro.com/solution/000285675", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-004941", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-400", trust: 1, }, { problemtype: "Resource exhaustion (CWE-400) [NVD Evaluation ]", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-004941", }, { db: "NVD", id: "CVE-2021-25252", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.6, url: "https://success.trendmicro.com/solution/000285675", }, { trust: 0.8, url: "http://jvn.jp/vu/jvnvu93009588/index.html", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2021-25252", }, { trust: 0.6, url: "https://vigilance.fr/vulnerability/trend-micro-scan-engine-denial-of-service-via-memory-exhaustion-34744", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2021-004941", }, { db: "CNNVD", id: "CNNVD-202103-242", }, { db: "NVD", id: "CVE-2021-25252", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "JVNDB", id: "JVNDB-2021-004941", }, { db: "CNNVD", id: "CNNVD-202103-242", }, { db: "NVD", id: "CVE-2021-25252", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-12-02T00:00:00", db: "JVNDB", id: "JVNDB-2021-004941", }, { date: "2021-03-03T00:00:00", db: "CNNVD", id: "CNNVD-202103-242", }, { date: "2021-03-03T16:15:00", db: "NVD", id: "CVE-2021-25252", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2021-12-02T09:04:00", db: "JVNDB", id: "JVNDB-2021-004941", }, { date: "2021-03-25T00:00:00", db: "CNNVD", id: "CNNVD-202103-242", }, { date: "2021-09-08T17:23:00", db: "NVD", id: "CVE-2021-25252", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-202103-242", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Trend Micro Resource depletion vulnerability in the product", sources: [ { db: "JVNDB", id: "JVNDB-2021-004941", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "resource management error", sources: [ { db: "CNNVD", id: "CNNVD-202103-242", }, ], trust: 0.6, }, }
Vulnerability from fkie_nvd
Published
2017-05-26 01:29
Modified
2024-11-21 03:35
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T117117, (9) T118, (10) T_action_fail, (11) T_ptn_update, (12) textarea, (13) textfield5, or (14) tmLastConfigFileModifiedDate parameter to notification.cgi.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*", matchCriteriaId: "D0E9F49F-7151-4150-A31D-CA68D0D4C268", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T117117, (9) T118, (10) T_action_fail, (11) T_ptn_update, (12) textarea, (13) textfield5, or (14) tmLastConfigFileModifiedDate parameter to notification.cgi.", }, { lang: "es", value: "Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en ServerProtect de Trend Micro para Linux versión 3.0 anterior a CP 1531, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio del parámetro (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update , (5) T113, (6) T114, (7) T115, (8) T117117, (9) T118, (10) T_action_fail, (11) T_ptn_update, (12) textarea, (13) textfield5, o (14) tmLastConfigFileModifiedDate en el archivo notification.cgi.", }, ], id: "CVE-2017-9037", lastModified: "2024-11-21T03:35:11.300", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-05-26T01:29:01.193", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038548", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1117411", }, { source: "cve@mitre.org", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038548", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1117411", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-02-24 03:15
Modified
2024-11-21 06:52
Severity ?
Summary
Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions.
References
▼ | URL | Tags | |
---|---|---|---|
security@trendmicro.com | https://success.trendmicro.com/solution/000290507 | Patch, Vendor Advisory | |
security@trendmicro.com | https://www.tenable.com/security/research/tra-2022-05 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/solution/000290507 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/research/tra-2022-05 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect_for_network_appliance_filer | 5.8 | |
trendmicro | serverprotect_for_storage | 6.0 | |
microsoft | windows | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*", matchCriteriaId: "0BD9FEA3-46A4-4CEF-97B5-27BC2120B082", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*", matchCriteriaId: "82D38D59-9208-4101-89D8-367E53DA29D5", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*", matchCriteriaId: "7293D7E6-196E-4C9F-B107-77FB2E770A1E", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect_for_network_appliance_filer:5.8:*:*:*:*:*:*:*", matchCriteriaId: "40C2C76C-A4F7-4E97-B775-4B49D5E72860", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect_for_storage:6.0:*:*:*:*:*:*:*", matchCriteriaId: "96C4E3E9-6FCE-435A-A3E8-99514B00589C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions.", }, { lang: "es", value: "Trend Micro ServerProtect Information Server versión 6.0/5.8, usa una credencial estática para llevar a cabo la autenticación cuando es escrito un comando específico en la consola. Un atacante remoto no autenticado con acceso al Information Server podría aprovechar esto para registrarse en el servidor y llevar a cabo acciones autenticadas", }, ], id: "CVE-2022-25329", lastModified: "2024-11-21T06:52:00.787", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-24T03:15:43.970", references: [ { source: "security@trendmicro.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000290507", }, { source: "security@trendmicro.com", tags: [ "Third Party Advisory", ], url: "https://www.tenable.com/security/research/tra-2022-05", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000290507", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.tenable.com/security/research/tra-2022-05", }, ], sourceIdentifier: "security@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-798", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-05-26 01:29
Modified
2024-11-21 03:35
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows remote attackers to hijack the authentication of users for requests to start an update from an arbitrary source via a crafted request to SProtectLinux/scanoption_set.cgi, related to the lack of anti-CSRF tokens.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*", matchCriteriaId: "D0E9F49F-7151-4150-A31D-CA68D0D4C268", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cross-site request forgery (CSRF) vulnerability in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows remote attackers to hijack the authentication of users for requests to start an update from an arbitrary source via a crafted request to SProtectLinux/scanoption_set.cgi, related to the lack of anti-CSRF tokens.", }, { lang: "es", value: "Una vulnerabilidad de tipo cross-site request forgery (CSRF) en ServerProtect de Trend Micro para Linux versión 3.0 anterior a CP 1531, permite a los atacantes remotos secuestrar la autenticación de los usuarios para solicitudes de inicio de una actualización desde una fuente arbitraria por medio de una petición diseñada para el archivo SProtectLinux/scanoption_set.cgi, relacionada a la falta de tokens anti-CSRF.", }, ], id: "CVE-2017-9033", lastModified: "2024-11-21T03:35:10.653", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 6.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-05-26T01:29:00.927", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038548", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1117411", }, { source: "cve@mitre.org", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038548", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1117411", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-352", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-02-20 23:15
Modified
2024-11-21 04:27
Severity ?
Summary
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial product installation by an authorized user. The attacker must convince the target to download malicious DLL locally which must be present when the installer is run.
References
▼ | URL | Tags | |
---|---|---|---|
security@trendmicro.com | https://success.trendmicro.com/solution/1123562 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/solution/1123562 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | control_manager | 7.0 | |
trendmicro | endpoint_sensor | 1.6 | |
trendmicro | im_security | 1.6.5 | |
trendmicro | mobile_security | 9.8 | |
trendmicro | officescan | xg | |
trendmicro | scanmail | 14.0 | |
trendmicro | security | 2019 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 6.0 | |
microsoft | windows | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:control_manager:7.0:*:*:*:*:*:*:*", matchCriteriaId: "6F58BCC4-75BE-4B7D-8E29-27CAE3184858", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:endpoint_sensor:1.6:*:*:*:*:*:*:*", matchCriteriaId: "0D8769B6-2E3A-41E1-B48F-68B740E6CC47", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:im_security:1.6.5:*:*:*:*:*:*:*", matchCriteriaId: "DF864E42-A053-4693-BCC3-B2F67A5F85E9", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:mobile_security:9.8:*:*:*:enterprise:*:*:*", matchCriteriaId: "2F570A01-23A1-4257-8A52-2BA3A14BC47C", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:officescan:xg:*:*:*:*:*:*:*", matchCriteriaId: "602A0266-B586-447A-A500-1145B77053E8", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:scanmail:14.0:*:*:*:*:microsoft_exchange:*:*", matchCriteriaId: "37BCA3F5-0BC9-4287-A97F-F5E20465EF0E", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:security:2019:*:*:*:*:*:*:*", matchCriteriaId: "C8F623C2-ACF4-4122-911E-3BE4A6D41927", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*", matchCriteriaId: "0BD9FEA3-46A4-4CEF-97B5-27BC2120B082", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*", matchCriteriaId: "82D38D59-9208-4101-89D8-367E53DA29D5", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*", matchCriteriaId: "7293D7E6-196E-4C9F-B107-77FB2E770A1E", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:6.0:*:*:*:*:storage:*:*", matchCriteriaId: "46FD65C7-6DED-47CA-988D-089E95D2F7B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial product installation by an authorized user. The attacker must convince the target to download malicious DLL locally which must be present when the installer is run.", }, { lang: "es", value: "Trend Micro ha reempaquetado instaladores para varios productos de Trend Micro que usaron una versión de un paquete de instalación que tenía una vulnerabilidad de secuestro de DLL, que podría ser explotada durante la instalación de un nuevo producto. Se encontró que la vulnerabilidad SOLO es explotable durante la instalación inicial del producto por parte de un usuario autorizado. El atacante necesita convencer al objetivo de descargar una DLL maliciosa localmente que debe estar presente cuando el instalador se ejecuta.", }, ], id: "CVE-2019-14688", lastModified: "2024-11-21T04:27:08.583", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "HIGH", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5.1, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:H/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 4.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-02-20T23:15:20.147", references: [ { source: "security@trendmicro.com", tags: [ "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1123562", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1123562", }, ], sourceIdentifier: "security@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-427", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-01-27 19:15
Modified
2024-11-21 05:54
Severity ?
Summary
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
security@trendmicro.com | https://success.trendmicro.com/solution/000284207 | Patch, Vendor Advisory | |
security@trendmicro.com | https://www.zerodayinitiative.com/advisories/ZDI-21-086/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/solution/000284207 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-086/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*", matchCriteriaId: "D0E9F49F-7151-4150-A31D-CA68D0D4C268", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.", }, { lang: "es", value: "Una vulnerabilidad de agotamiento de la memoria en Trend Micro ServerProtect para Linux versión 3.0, podría permitir a un atacante local diseñar archivos específicos que pueden causar una denegación de servicio en el producto afectado. El fallo específico se presenta dentro de un componente de escaneo programado. Un atacante primero debe obtener la capacidad de ejecutar código poco privilegiado en el sistema objetivo a fin de explotar esta vulnerabilidad", }, ], id: "CVE-2021-25225", lastModified: "2024-11-21T05:54:34.917", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-27T19:15:13.547", references: [ { source: "security@trendmicro.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000284207", }, { source: "security@trendmicro.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-086/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000284207", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-086/", }, ], sourceIdentifier: "security@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-09-29 11:15
Modified
2024-11-21 06:14
Severity ?
Summary
A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.
References
▼ | URL | Tags | |
---|---|---|---|
security@trendmicro.com | https://success.trendmicro.com/jp/solution/000289030 | Patch, Vendor Advisory | |
security@trendmicro.com | https://success.trendmicro.com/solution/000289038 | Patch, Vendor Advisory | |
security@trendmicro.com | https://www.zerodayinitiative.com/advisories/ZDI-21-1115/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/jp/solution/000289030 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/solution/000289038 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-1115/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 6.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*", matchCriteriaId: "0BD9FEA3-46A4-4CEF-97B5-27BC2120B082", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netapp:*:*", matchCriteriaId: "63D1510A-8DB9-47AC-97DC-FFF7BB7E9072", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*", matchCriteriaId: "82D38D59-9208-4101-89D8-367E53DA29D5", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*", matchCriteriaId: "7293D7E6-196E-4C9F-B107-77FB2E770A1E", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:6.0:*:*:*:*:storage:*:*", matchCriteriaId: "46FD65C7-6DED-47CA-988D-089E95D2F7B5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.", }, { lang: "es", value: "Una vulnerabilidad en Trend Micro ServerProtect for Storage versión 6.0, ServerProtect for EMC Celerra versión 5.8, ServerProtect for Network Appliance Filers versión 5.8 y ServerProtect for Microsoft Windows / Novell Netware versión 5.8 podría permitir a un atacante remoto omitir la autenticación en las instalaciones afectadas", }, ], id: "CVE-2021-36745", lastModified: "2024-11-21T06:14:00.293", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-09-29T11:15:07.600", references: [ { source: "security@trendmicro.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/jp/solution/000289030", }, { source: "security@trendmicro.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000289038", }, { source: "security@trendmicro.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/jp/solution/000289030", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000289038", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/", }, ], sourceIdentifier: "security@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-425", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-08-05 14:15
Modified
2024-11-21 05:39
Severity ?
Summary
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
security@trendmicro.com | https://jvn.jp/en/vu/JVNVU99160193/index.html | Third Party Advisory | |
security@trendmicro.com | https://jvn.jp/vu/JVNVU99160193/ | Third Party Advisory | |
security@trendmicro.com | https://success.trendmicro.com/jp/solution/000260748 | Vendor Advisory | |
security@trendmicro.com | https://success.trendmicro.com/solution/000260713 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/vu/JVNVU99160193/index.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/vu/JVNVU99160193/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/jp/solution/000260748 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/solution/000260713 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | antivirus_toolkit | * | |
trendmicro | apex_one | 2019 | |
trendmicro | apex_one | saas | |
trendmicro | deep_security | 9.6 | |
trendmicro | deep_security | 10.0 | |
trendmicro | deep_security | 11.0 | |
trendmicro | deep_security | 12.0 | |
trendmicro | officescan | xg | |
trendmicro | officescan_business_security | 9.0 | |
trendmicro | officescan_business_security | 9.5 | |
trendmicro | officescan_business_security | 10.0 | |
trendmicro | officescan_business_security_service | - | |
trendmicro | officescan_cloud | 15 | |
trendmicro | officescan_cloud | 16.0 | |
trendmicro | online_scan | 8.0 | |
trendmicro | portable_security | 2.0 | |
trendmicro | portable_security | 3.0 | |
trendmicro | rootkit_buster | 2.2 | |
trendmicro | safe_lock | - | |
trendmicro | safe_lock | 2.0 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 6.0 | |
microsoft | windows | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:antivirus_toolkit:*:*:*:*:*:*:*:*", matchCriteriaId: "5225790C-66F3-438C-82A9-0567EA2D3EAE", versionEndExcluding: "1.62.1240", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:*:*:*:*", matchCriteriaId: "AF019D2D-C426-4D2D-A254-442CE777B41E", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:apex_one:saas:*:*:*:*:*:*:*", matchCriteriaId: "0BD39638-1D52-4FA8-BBA0-305795D7D2E0", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:deep_security:9.6:*:*:*:*:*:*:*", matchCriteriaId: "A741097B-4B1F-4541-8E81-ABAAB16F4CCF", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:deep_security:10.0:*:*:*:*:*:*:*", matchCriteriaId: "4CC7B6BD-BAF1-4E0D-9BFB-6A9BE7D3AC40", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:deep_security:11.0:*:*:*:*:*:*:*", matchCriteriaId: "81D6DD3F-6DA9-4D25-A0AB-8A2670A6FE91", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:deep_security:12.0:*:*:*:*:*:*:*", matchCriteriaId: "4BDD405A-E3EA-48F8-AC3D-E45A666920C5", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:officescan:xg:sp1:*:*:*:*:*:*", matchCriteriaId: "64600B42-4884-41F2-A683-AE1EDB79372E", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:officescan_business_security:9.0:*:*:*:*:*:*:*", matchCriteriaId: "B20A7619-A7A7-4048-BF27-5B2613DCF914", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:officescan_business_security:9.5:*:*:*:*:*:*:*", matchCriteriaId: "14329F60-1C5D-4A4C-BBCA-BD42FFB4FB73", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:officescan_business_security:10.0:sp1:*:*:*:*:*:*", matchCriteriaId: "762313F8-2BA6-4ED7-A977-56C962D5B27F", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:officescan_business_security_service:-:*:*:*:*:*:*:*", matchCriteriaId: "0E3FC1CA-FFB4-4838-9BCE-BB5CAC28505F", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:officescan_cloud:15:*:*:*:*:*:*:*", matchCriteriaId: "7D4FDFB7-9F82-47F2-B265-916BFCE0A0EA", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:officescan_cloud:16.0:*:*:*:*:*:*:*", matchCriteriaId: "C23A004A-B597-402D-BFA8-9EB11580B13F", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:online_scan:8.0:*:*:*:*:*:*:*", matchCriteriaId: "388766C0-6983-453A-A1C2-8266127337C3", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:portable_security:2.0:*:*:*:*:*:*:*", matchCriteriaId: "D33BDD31-422F-4DB0-B2DC-789611260C35", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:portable_security:3.0:*:*:*:*:*:*:*", matchCriteriaId: "079E3712-9365-44F8-804B-2ADBD89C1D5D", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:rootkit_buster:2.2:*:*:*:*:*:*:*", matchCriteriaId: "4AA0F265-BD68-41F7-99DD-8832EE7E295B", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:safe_lock:-:*:*:*:txone:*:*:*", matchCriteriaId: "8549A2AA-5BDE-4B27-9861-9426769FAB0E", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:safe_lock:2.0:sp1:*:*:-:*:*:*", matchCriteriaId: "9B28CE37-C436-4440-B43F-905482D91AD9", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*", matchCriteriaId: "0BD9FEA3-46A4-4CEF-97B5-27BC2120B082", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*", matchCriteriaId: "82D38D59-9208-4101-89D8-367E53DA29D5", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*", matchCriteriaId: "7293D7E6-196E-4C9F-B107-77FB2E770A1E", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:6.0:*:*:*:*:storage:*:*", matchCriteriaId: "46FD65C7-6DED-47CA-988D-089E95D2F7B5", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.", }, { lang: "es", value: "Una vulnerabilidad de comprobación de entrada que se encuentra en varios productos de Trend Micro que usan una versión particular de un controlador de protección de rootkit específico, podría permitir a un atacante en modo usuario con permisos de administrador abusar del controlador para modificar una dirección del kernel que puede causar un bloqueo del sistema o potencialmente conllevar a una ejecución de código en modo kernel. Un atacante ya debe haber obtenido acceso de administrador en la máquina de destino (legítimamente o mediante un ataque no relacionado separado) para explotar esta vulnerabilidad", }, ], id: "CVE-2020-8607", lastModified: "2024-11-21T05:39:07.050", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-08-05T14:15:13.530", references: [ { source: "security@trendmicro.com", tags: [ "Third Party Advisory", ], url: "https://jvn.jp/en/vu/JVNVU99160193/index.html", }, { source: "security@trendmicro.com", tags: [ "Third Party Advisory", ], url: "https://jvn.jp/vu/JVNVU99160193/", }, { source: "security@trendmicro.com", tags: [ "Vendor Advisory", ], url: "https://success.trendmicro.com/jp/solution/000260748", }, { source: "security@trendmicro.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000260713", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://jvn.jp/en/vu/JVNVU99160193/index.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://jvn.jp/vu/JVNVU99160193/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://success.trendmicro.com/jp/solution/000260748", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000260713", }, ], sourceIdentifier: "security@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-01-27 19:15
Modified
2024-11-21 05:54
Severity ?
Summary
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
security@trendmicro.com | https://success.trendmicro.com/solution/000284207 | Patch, Vendor Advisory | |
security@trendmicro.com | https://www.zerodayinitiative.com/advisories/ZDI-21-085/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/solution/000284207 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-085/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*", matchCriteriaId: "D0E9F49F-7151-4150-A31D-CA68D0D4C268", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.", }, { lang: "es", value: "Una vulnerabilidad de agotamiento de la memoria en Trend Micro ServerProtect para Linux versión 3.0, podría permitir a un atacante local diseñar archivos específicos que pueden causar una denegación de servicio en el producto afectado. El fallo específico se presenta dentro de un componente de escaneo manual. Un atacante primero debe obtener la capacidad de ejecutar código poco privilegiado en el sistema objetivo a fin de explotar esta vulnerabilidad", }, ], id: "CVE-2021-25224", lastModified: "2024-11-21T05:54:34.793", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-27T19:15:13.437", references: [ { source: "security@trendmicro.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000284207", }, { source: "security@trendmicro.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-085/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000284207", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-085/", }, ], sourceIdentifier: "security@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-01-27 19:15
Modified
2024-11-21 05:54
Severity ?
Summary
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
security@trendmicro.com | https://success.trendmicro.com/solution/000284207 | Patch, Vendor Advisory | |
security@trendmicro.com | https://www.zerodayinitiative.com/advisories/ZDI-21-087/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/solution/000284207 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-21-087/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*", matchCriteriaId: "D0E9F49F-7151-4150-A31D-CA68D0D4C268", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.", }, { lang: "es", value: "Una vulnerabilidad de agotamiento de la memoria en Trend Micro ServerProtect para Linux versión 3.0, podría permitir a un atacante local diseñar archivos específicos que pueden causar una denegación de servicio en el producto afectado. El fallo específico se presenta dentro de un componente de motor de escaneo. Un atacante primero debe obtener la capacidad de ejecutar código poco privilegiado en el sistema objetivo a fin de explotar esta vulnerabilidad", }, ], id: "CVE-2021-25226", lastModified: "2024-11-21T05:54:35.030", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "LOW", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 2.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-01-27T19:15:13.610", references: [ { source: "security@trendmicro.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000284207", }, { source: "security@trendmicro.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-087/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000284207", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-087/", }, ], sourceIdentifier: "security@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-02-24 03:15
Modified
2024-11-21 06:52
Severity ?
Summary
Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process.
References
▼ | URL | Tags | |
---|---|---|---|
security@trendmicro.com | https://success.trendmicro.com/solution/000290507 | Patch, Vendor Advisory | |
security@trendmicro.com | https://www.tenable.com/security/research/tra-2022-05 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/solution/000290507 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/research/tra-2022-05 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect_for_network_appliance_filer | 5.8 | |
trendmicro | serverprotect_for_storage | 6.0 | |
microsoft | windows | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*", matchCriteriaId: "0BD9FEA3-46A4-4CEF-97B5-27BC2120B082", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*", matchCriteriaId: "82D38D59-9208-4101-89D8-367E53DA29D5", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*", matchCriteriaId: "7293D7E6-196E-4C9F-B107-77FB2E770A1E", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect_for_network_appliance_filer:5.8:*:*:*:*:*:*:*", matchCriteriaId: "40C2C76C-A4F7-4E97-B775-4B49D5E72860", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect_for_storage:6.0:*:*:*:*:*:*:*", matchCriteriaId: "96C4E3E9-6FCE-435A-A3E8-99514B00589C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process.", }, { lang: "es", value: "Unas excepciones no capturadas que pueden generarse en Trend Micro ServerProtection Information Server versión 6.0/5.8, podrían permitir a un atacante remoto bloquear el proceso", }, ], id: "CVE-2022-25331", lastModified: "2024-11-21T06:52:01.010", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-24T03:15:44.070", references: [ { source: "security@trendmicro.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000290507", }, { source: "security@trendmicro.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.tenable.com/security/research/tra-2022-05", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000290507", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.tenable.com/security/research/tra-2022-05", }, ], sourceIdentifier: "security@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-09-15 20:15
Modified
2024-11-21 05:14
Severity ?
Summary
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
security@trendmicro.com | https://success.trendmicro.com/solution/000268419 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/solution/000268419 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*", matchCriteriaId: "D0E9F49F-7151-4150-A31D-CA68D0D4C268", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.", }, { lang: "es", value: "Una vulnerabilidad de inyección de comandos en Trend Micro ServerProtect para Linux versión 3.0, podría permitir a un atacante ejecutar código arbitrario en un sistema afectado. Un atacante debe primero obtener privilegios admin/root en la consola SPLX para explotar esta vulnerabilidad", }, ], id: "CVE-2020-24561", lastModified: "2024-11-21T05:14:59.730", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.1, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.3, impactScore: 6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-09-15T20:15:13.337", references: [ { source: "security@trendmicro.com", tags: [ "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000268419", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000268419", }, ], sourceIdentifier: "security@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-77", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-05-26 01:29
Modified
2024-11-21 03:35
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*", matchCriteriaId: "D0E9F49F-7151-4150-A31D-CA68D0D4C268", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi.", }, { lang: "es", value: "Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en ServerProtect de Trend Micro para Linux versión 3.0 anterior a CP 1531, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio del parámetro (1) T1 o (2) tmLastConfigFileModifiedDate en el archivo log_management.cgi.", }, ], id: "CVE-2017-9032", lastModified: "2024-11-21T03:35:10.490", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-05-26T01:29:00.847", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038548", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1117411", }, { source: "cve@mitre.org", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038548", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1117411", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-02-24 03:15
Modified
2024-11-21 06:52
Severity ?
Summary
Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote attacker to crash the process or achieve remote code execution.
References
▼ | URL | Tags | |
---|---|---|---|
security@trendmicro.com | https://success.trendmicro.com/solution/000290507 | Patch, Vendor Advisory | |
security@trendmicro.com | https://www.tenable.com/security/research/tra-2022-05 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/solution/000290507 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/research/tra-2022-05 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect | 5.8 | |
trendmicro | serverprotect_for_network_appliance_filer | 5.8 | |
trendmicro | serverprotect_for_storage | 6.0 | |
microsoft | windows | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:emc:*:*", matchCriteriaId: "0BD9FEA3-46A4-4CEF-97B5-27BC2120B082", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:netware:*:*", matchCriteriaId: "82D38D59-9208-4101-89D8-367E53DA29D5", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:*:*:*:*:windows:*:*", matchCriteriaId: "7293D7E6-196E-4C9F-B107-77FB2E770A1E", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:serverprotect_for_network_appliance_filer:5.8:*:*:*:*:*:*:*", matchCriteriaId: "40C2C76C-A4F7-4E97-B775-4B49D5E72860", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect_for_storage:6.0:*:*:*:*:*:*:*", matchCriteriaId: "96C4E3E9-6FCE-435A-A3E8-99514B00589C", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote attacker to crash the process or achieve remote code execution.", }, { lang: "es", value: "Unas condiciones de desbordamiento de enteros que se presentan en Trend Micro ServerProtect Information Server versión 6.0/5.8, podrían permitir a un atacante remoto bloquear el proceso o lograr una ejecución de código remota", }, ], id: "CVE-2022-25330", lastModified: "2024-11-21T06:52:00.907", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-02-24T03:15:44.020", references: [ { source: "security@trendmicro.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000290507", }, { source: "security@trendmicro.com", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.tenable.com/security/research/tra-2022-05", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000290507", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://www.tenable.com/security/research/tra-2022-05", }, ], sourceIdentifier: "security@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-190", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-05-26 01:29
Modified
2024-11-21 03:35
Severity ?
Summary
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to eavesdrop and tamper with updates by leveraging unencrypted communications with update servers.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*", matchCriteriaId: "D0E9F49F-7151-4150-A31D-CA68D0D4C268", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to eavesdrop and tamper with updates by leveraging unencrypted communications with update servers.", }, { lang: "es", value: "Trend Micro ServerProtect para Linux 3.0 en versiones anteriores a la CP 1531 permite a los atacantes escuchar y manipular actualizaciones, aprovechando comunicaciones sin cifrar con servidores de actualización.", }, ], id: "CVE-2017-9035", lastModified: "2024-11-21T03:35:10.970", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5.8, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:P/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 4.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.4, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-05-26T01:29:01.067", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038548", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1117411", }, { source: "cve@mitre.org", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038548", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1117411", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-319", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-03-03 16:15
Modified
2024-11-21 05:54
Severity ?
Summary
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
References
▼ | URL | Tags | |
---|---|---|---|
security@trendmicro.com | https://success.trendmicro.com/solution/000285675 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/solution/000285675 | Patch, Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:apex_central:2019:-:*:*:*:*:*:*", matchCriteriaId: "F1A4CE49-201A-4A47-A760-6463C454A6AD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:apex_one:2019:-:*:*:*:*:*:*", matchCriteriaId: "219071B9-2D31-4E7F-A0AD-769FE0243B35", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:cloud_edge:5.0:*:*:*:*:*:*:*", matchCriteriaId: "8E326AF6-B46B-40BE-8CDF-0F94A99FAED6", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:apex_one:-:-:*:*:*:*:*:*", matchCriteriaId: "E31C9ADB-D6BB-4C69-A6D6-DFFD2D2140D6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:deep_security:10.0:-:*:*:*:*:*:*", matchCriteriaId: "6B7E15DA-AE75-4CD7-AA71-A560A78D968C", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:deep_security:11.0:-:*:*:*:*:*:*", matchCriteriaId: "8241E0BC-5DA9-4C60-B844-56FC23E47152", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:deep_security:12.0:-:*:*:*:*:*:*", matchCriteriaId: "3E49F38B-B210-49CB-9F76-B65CAB36BC74", vulnerable: true, }, { criteria: "cpe:2.3:a:trendmicro:deep_security:20.0:-:*:*:long_term_support:*:*:*", matchCriteriaId: "398B0CDB-03CB-434C-9650-24340C093C86", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:control_manager:7.0:-:*:*:*:*:*:*", matchCriteriaId: "165D2436-C6A3-47A9-9FE3-51628BF6C414", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:deep_discovery_analyzer:5.1:-:*:*:*:*:*:*", matchCriteriaId: "A31C0DF7-D04B-4BF6-8A9C-FD9AB7E68B0A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:deep_discovery_email_inspector:2.5:-:*:*:*:*:*:*", matchCriteriaId: "B664C78E-D12E-4405-A35F-54BD90437AD3", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:deep_discovery_inspector:3.8:-:*:*:*:*:*:*", matchCriteriaId: "B6D67DBF-FA30-44B7-9404-9C17EA72295B", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:interscan_messaging_security_virtual_appliance:9.1:-:*:*:*:*:*:*", matchCriteriaId: "0429A7DF-3CB4-44BB-A26A-54DB9EE25ABD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:interscan_web_security_virtual_appliance:6.5:-:*:*:*:*:*:*", matchCriteriaId: "DFF71E3A-0C66-4FCC-AEEE-3CCFBDCF3ADD", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:officescan:-:*:*:*:*:*:*:*", matchCriteriaId: "3448C332-00D7-41B3-BD1A-9D665CED4F6A", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:portal_protect:2.6:*:*:*:*:*:*:*", matchCriteriaId: "3649712F-7311-453F-BC0B-6608F4750086", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:scanmail:14.0:*:*:*:*:microsoft_exchange:*:*", matchCriteriaId: "37BCA3F5-0BC9-4287-A97F-F5E20465EF0E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:scanmail_for_ibm_domino:5.8:-:*:*:*:*:*:*", matchCriteriaId: "E45ABCCA-69AD-45B6-833C-06380C83702E", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", matchCriteriaId: "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect_for_storage:6.0:-:*:*:*:*:*:*", matchCriteriaId: "3C44B160-E042-465C-9442-296202E9B750", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:5.8:-:*:*:*:*:*:*", matchCriteriaId: "889BBE0A-A33B-4CF8-8801-DC1202621FAA", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:emc:celerra_network_attached_storage:-:*:*:*:*:*:*:*", matchCriteriaId: "FABC70E5-DC68-4538-B7AA-30385E54FC45", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, { criteria: "cpe:2.3:o:novell:netware:-:*:*:*:*:*:*:*", matchCriteriaId: "61BD8560-99BE-46E5-8366-7CD9CD3427E6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect_for_network_appliance_filers:5.8:-:*:*:*:*:*:*", matchCriteriaId: "60880631-D7EC-4F88-8C4C-9217861D2047", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:netapp:cluster_data_ontap:-:*:*:*:*:*:*:*", matchCriteriaId: "6D877693-7976-44ED-AE10-EADF8C98ACB2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:safe_lock:1.1:-:*:*:txone:*:*:*", matchCriteriaId: "E82A9956-C47F-4AC2-BFAE-A12C496502A2", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:worry-free_business_security:10.1:-:*:*:*:*:*:*", matchCriteriaId: "ED502EB1-F3E9-46B6-BE08-6FCCE0AE1E12", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", matchCriteriaId: "A2572D17-1DE6-457B-99CC-64AFD54487EA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.", }, { lang: "es", value: "La API Virus Scan (VSAPI) y el Advanced Threat Scan Engine (ATSE) de Trend Micro, son susceptibles a una vulnerabilidad de agotamiento de la memoria que puede conllevar a una denegación de servicio o a un congelamiento del sistema si es explotada por un atacante usando un archivo especialmente diseñado", }, ], id: "CVE-2021-25252", lastModified: "2024-11-21T05:54:38.113", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 4.9, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:L/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-03-03T16:15:13.087", references: [ { source: "security@trendmicro.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000285675", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000285675", }, ], sourceIdentifier: "security@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-05-26 01:29
Modified
2024-11-21 03:35
Severity ?
Summary
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows local users to gain privileges by leveraging an unrestricted quarantine directory.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*", matchCriteriaId: "D0E9F49F-7151-4150-A31D-CA68D0D4C268", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows local users to gain privileges by leveraging an unrestricted quarantine directory.", }, { lang: "es", value: "Trend Micro ServerProtect para Linux 3.0 en versiones anteriores a la CP 1531, permite a los usuarios locales obtener privilegios manipulando un directorio de cuarentena no restringido.", }, ], id: "CVE-2017-9036", lastModified: "2024-11-21T03:35:11.133", metrics: { cvssMetricV2: [ { acInsufInfo: true, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 7.2, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-05-26T01:29:01.130", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038548", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1117411", }, { source: "cve@mitre.org", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038548", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1117411", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-862", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2020-12-01 19:15
Modified
2024-11-21 05:22
Severity ?
Summary
A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability.
References
▼ | URL | Tags | |
---|---|---|---|
security@trendmicro.com | https://success.trendmicro.com/solution/000281950 | Vendor Advisory | |
security@trendmicro.com | https://www.zerodayinitiative.com/advisories/ZDI-20-1378/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://success.trendmicro.com/solution/000281950 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-20-1378/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*", matchCriteriaId: "D0E9F49F-7151-4150-A31D-CA68D0D4C268", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability.", }, { lang: "es", value: "Una vulnerabilidad de escalada de privilegios de desbordamiento de búfer en la región heap de la memoria en Trend Micro ServerProtect para Linux versión 3.0, puede permitir a un atacante escalar privilegios en las instalaciones afectadas. Un atacante primero debe obtener la capacidad de ejecutar código muy privilegiado en el objetivo a fin de explotar esta vulnerabilidad", }, ], id: "CVE-2020-28575", lastModified: "2024-11-21T05:22:56.113", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 4.6, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 3.9, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 6.7, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 0.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-12-01T19:15:11.947", references: [ { source: "security@trendmicro.com", tags: [ "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000281950", }, { source: "security@trendmicro.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-20-1378/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/000281950", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-20-1378/", }, ], sourceIdentifier: "security@trendmicro.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-787", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-05-26 01:29
Modified
2024-11-21 03:35
Severity ?
Summary
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to write to arbitrary files and consequently execute arbitrary code with root privileges by leveraging failure to validate software updates.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
trendmicro | serverprotect | 3.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*", matchCriteriaId: "D0E9F49F-7151-4150-A31D-CA68D0D4C268", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to write to arbitrary files and consequently execute arbitrary code with root privileges by leveraging failure to validate software updates.", }, { lang: "es", value: "ServerProtect de Trend Micro para Linux versión 3.0 anterior a CP 1531 permite a los atacantes escribir en archivos arbitrarios y en consecuencia, ejecutar código arbitrario con privilegios de root mediante el aprovechamiento del fallo para comprobar las actualizaciones del programa.", }, ], id: "CVE-2017-9034", lastModified: "2024-11-21T03:35:10.820", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-05-26T01:29:00.990", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038548", }, { source: "cve@mitre.org", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1117411", }, { source: "cve@mitre.org", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", "VDB Entry", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1038548", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://success.trendmicro.com/solution/1117411", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
CVE-2021-25224 (GCVE-0-2021-25224)
Vulnerability from cvelistv5
Published
2021-01-27 19:10
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284207 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-085/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro ServerProtect for Linux |
Version: 3.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T19:56:11.064Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/solution/000284207", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-085/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Trend Micro ServerProtect for Linux", vendor: "Trend Micro", versions: [ { status: "affected", version: "3.0", }, ], }, ], descriptions: [ { lang: "en", value: "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.", }, ], problemTypes: [ { descriptions: [ { description: "Memory Exhaustion DOS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-27T19:10:24", orgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", shortName: "trendmicro", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/solution/000284207", }, { tags: [ "x_refsource_MISC", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-085/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@trendmicro.com", ID: "CVE-2021-25224", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Trend Micro ServerProtect for Linux", version: { version_data: [ { version_value: "3.0", }, ], }, }, ], }, vendor_name: "Trend Micro", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a manual scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Memory Exhaustion DOS", }, ], }, ], }, references: { reference_data: [ { name: "https://success.trendmicro.com/solution/000284207", refsource: "MISC", url: "https://success.trendmicro.com/solution/000284207", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-21-085/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-21-085/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", assignerShortName: "trendmicro", cveId: "CVE-2021-25224", datePublished: "2021-01-27T19:10:24", dateReserved: "2021-01-15T00:00:00", dateUpdated: "2024-08-03T19:56:11.064Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-24561 (GCVE-0-2020-24561)
Vulnerability from cvelistv5
Published
2020-09-15 20:00
Modified
2024-08-04 15:19
Severity ?
EPSS score ?
Summary
A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000268419 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro ServerProtect for Linux |
Version: 3.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T15:19:07.396Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/solution/000268419", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Trend Micro ServerProtect for Linux", vendor: "Trend Micro", versions: [ { status: "affected", version: "3.0", }, ], }, ], descriptions: [ { lang: "en", value: "A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.", }, ], problemTypes: [ { descriptions: [ { description: "Command Injection", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-09-15T20:00:16", orgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", shortName: "trendmicro", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/solution/000268419", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@trendmicro.com", ID: "CVE-2020-24561", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Trend Micro ServerProtect for Linux", version: { version_data: [ { version_value: "3.0", }, ], }, }, ], }, vendor_name: "Trend Micro", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A command injection vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow an attacker to execute arbitrary code on an affected system. An attacker must first obtain admin/root privileges on the SPLX console to exploit this vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Command Injection", }, ], }, ], }, references: { reference_data: [ { name: "https://success.trendmicro.com/solution/000268419", refsource: "MISC", url: "https://success.trendmicro.com/solution/000268419", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", assignerShortName: "trendmicro", cveId: "CVE-2020-24561", datePublished: "2020-09-15T20:00:16", dateReserved: "2020-08-20T00:00:00", dateUpdated: "2024-08-04T15:19:07.396Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-28575 (GCVE-0-2020-28575)
Vulnerability from cvelistv5
Published
2020-12-01 18:40
Modified
2024-08-04 16:40
Severity ?
EPSS score ?
Summary
A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000281950 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-20-1378/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro ServerProtect for Linux |
Version: 3.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T16:40:58.911Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/solution/000281950", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-20-1378/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Trend Micro ServerProtect for Linux", vendor: "Trend Micro", versions: [ { status: "affected", version: "3.0", }, ], }, ], descriptions: [ { lang: "en", value: "A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability.", }, ], problemTypes: [ { descriptions: [ { description: "Heap-based Buffer Overflow Privilege Escalation", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-12-01T18:40:37", orgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", shortName: "trendmicro", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/solution/000281950", }, { tags: [ "x_refsource_MISC", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-20-1378/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@trendmicro.com", ID: "CVE-2020-28575", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Trend Micro ServerProtect for Linux", version: { version_data: [ { version_value: "3.0", }, ], }, }, ], }, vendor_name: "Trend Micro", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A heap-based buffer overflow privilege escalation vulnerability in Trend Micro ServerProtect for Linux 3.0 may allow an attacker to escalate privileges on affected installations. An attacker must first obtain the ability to execute high-privileged code on the target in order to exploit this vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Heap-based Buffer Overflow Privilege Escalation", }, ], }, ], }, references: { reference_data: [ { name: "https://success.trendmicro.com/solution/000281950", refsource: "MISC", url: "https://success.trendmicro.com/solution/000281950", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-20-1378/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-20-1378/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", assignerShortName: "trendmicro", cveId: "CVE-2020-28575", datePublished: "2020-12-01T18:40:38", dateReserved: "2020-11-12T00:00:00", dateUpdated: "2024-08-04T16:40:58.911Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-9037 (GCVE-0-2017-9037)
Vulnerability from cvelistv5
Published
2017-05-25 19:00
Modified
2024-08-05 16:55
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T117117, (9) T118, (10) T_action_fail, (11) T_ptn_update, (12) textarea, (13) textfield5, or (14) tmLastConfigFileModifiedDate parameter to notification.cgi.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1038548 | vdb-entry, x_refsource_SECTRACK | |
https://success.trendmicro.com/solution/1117411 | x_refsource_CONFIRM | |
https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2017/May/91 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:55:21.848Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1038548", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038548", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://success.trendmicro.com/solution/1117411", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-05-23T00:00:00", descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T117117, (9) T118, (10) T_action_fail, (11) T_ptn_update, (12) textarea, (13) textfield5, or (14) tmLastConfigFileModifiedDate parameter to notification.cgi.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-05-25T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1038548", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038548", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://success.trendmicro.com/solution/1117411", }, { tags: [ "x_refsource_MISC", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-9037", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) S44, (2) S5, (3) S_action_fail, (4) S_ptn_update, (5) T113, (6) T114, (7) T115, (8) T117117, (9) T118, (10) T_action_fail, (11) T_ptn_update, (12) textarea, (13) textfield5, or (14) tmLastConfigFileModifiedDate parameter to notification.cgi.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1038548", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038548", }, { name: "https://success.trendmicro.com/solution/1117411", refsource: "CONFIRM", url: "https://success.trendmicro.com/solution/1117411", }, { name: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", refsource: "MISC", url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2017/May/91", }, { name: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-9037", datePublished: "2017-05-25T19:00:00", dateReserved: "2017-05-17T00:00:00", dateUpdated: "2024-08-05T16:55:21.848Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2022-25329 (GCVE-0-2022-25329)
Vulnerability from cvelistv5
Published
2022-02-24 02:45
Modified
2024-08-03 04:36
Severity ?
EPSS score ?
Summary
Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000290507 | x_refsource_MISC | |
https://www.tenable.com/security/research/tra-2022-05 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
▼ | Trend Micro | Trend Micro ServerProtect for Storage |
Version: 6.0 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T04:36:06.803Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/solution/000290507", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.tenable.com/security/research/tra-2022-05", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Trend Micro ServerProtect for Storage", vendor: "Trend Micro", versions: [ { status: "affected", version: "6.0", }, ], }, { product: "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare", vendor: "Trend Micro", versions: [ { status: "affected", version: "5.8", }, ], }, { product: "Trend Micro ServerProtect for EMC Celerra", vendor: "Trend Micro", versions: [ { status: "affected", version: "5.8", }, ], }, { product: "Trend Micro ServerProtect for Network Appliance Filers", vendor: "Trend Micro", versions: [ { status: "affected", version: "5.8", }, ], }, ], descriptions: [ { lang: "en", value: "Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions.", }, ], problemTypes: [ { descriptions: [ { description: "Static Credential", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-24T02:45:21", orgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", shortName: "trendmicro", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/solution/000290507", }, { tags: [ "x_refsource_MISC", ], url: "https://www.tenable.com/security/research/tra-2022-05", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@trendmicro.com", ID: "CVE-2022-25329", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Trend Micro ServerProtect for Storage", version: { version_data: [ { version_value: "6.0", }, ], }, }, { product_name: "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare", version: { version_data: [ { version_value: "5.8", }, ], }, }, { product_name: "Trend Micro ServerProtect for EMC Celerra", version: { version_data: [ { version_value: "5.8", }, ], }, }, { product_name: "Trend Micro ServerProtect for Network Appliance Filers", version: { version_data: [ { version_value: "5.8", }, ], }, }, ], }, vendor_name: "Trend Micro", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Trend Micro ServerProtect 6.0/5.8 Information Server uses a static credential to perform authentication when a specific command is typed in the console. An unauthenticated remote attacker with access to the Information Server could exploit this to register to the server and perform authenticated actions.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Static Credential", }, ], }, ], }, references: { reference_data: [ { name: "https://success.trendmicro.com/solution/000290507", refsource: "MISC", url: "https://success.trendmicro.com/solution/000290507", }, { name: "https://www.tenable.com/security/research/tra-2022-05", refsource: "MISC", url: "https://www.tenable.com/security/research/tra-2022-05", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", assignerShortName: "trendmicro", cveId: "CVE-2022-25329", datePublished: "2022-02-24T02:45:21", dateReserved: "2022-02-18T00:00:00", dateUpdated: "2024-08-03T04:36:06.803Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-9033 (GCVE-0-2017-9033)
Vulnerability from cvelistv5
Published
2017-05-25 19:00
Modified
2024-08-05 16:55
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows remote attackers to hijack the authentication of users for requests to start an update from an arbitrary source via a crafted request to SProtectLinux/scanoption_set.cgi, related to the lack of anti-CSRF tokens.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1038548 | vdb-entry, x_refsource_SECTRACK | |
https://success.trendmicro.com/solution/1117411 | x_refsource_CONFIRM | |
https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2017/May/91 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:55:21.874Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1038548", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038548", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://success.trendmicro.com/solution/1117411", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-05-23T00:00:00", descriptions: [ { lang: "en", value: "Cross-site request forgery (CSRF) vulnerability in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows remote attackers to hijack the authentication of users for requests to start an update from an arbitrary source via a crafted request to SProtectLinux/scanoption_set.cgi, related to the lack of anti-CSRF tokens.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-05-25T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1038548", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038548", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://success.trendmicro.com/solution/1117411", }, { tags: [ "x_refsource_MISC", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-9033", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cross-site request forgery (CSRF) vulnerability in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows remote attackers to hijack the authentication of users for requests to start an update from an arbitrary source via a crafted request to SProtectLinux/scanoption_set.cgi, related to the lack of anti-CSRF tokens.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1038548", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038548", }, { name: "https://success.trendmicro.com/solution/1117411", refsource: "CONFIRM", url: "https://success.trendmicro.com/solution/1117411", }, { name: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", refsource: "MISC", url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2017/May/91", }, { name: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-9033", datePublished: "2017-05-25T19:00:00", dateReserved: "2017-05-17T00:00:00", dateUpdated: "2024-08-05T16:55:21.874Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2022-25330 (GCVE-0-2022-25330)
Vulnerability from cvelistv5
Published
2022-02-24 02:45
Modified
2024-08-03 04:36
Severity ?
EPSS score ?
Summary
Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote attacker to crash the process or achieve remote code execution.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000290507 | x_refsource_MISC | |
https://www.tenable.com/security/research/tra-2022-05 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
▼ | Trend Micro | Trend Micro ServerProtect for Storage |
Version: 6.0 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T04:36:06.908Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/solution/000290507", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.tenable.com/security/research/tra-2022-05", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Trend Micro ServerProtect for Storage", vendor: "Trend Micro", versions: [ { status: "affected", version: "6.0", }, ], }, { product: "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare", vendor: "Trend Micro", versions: [ { status: "affected", version: "5.8", }, ], }, { product: "Trend Micro ServerProtect for EMC Celerra", vendor: "Trend Micro", versions: [ { status: "affected", version: "5.8", }, ], }, { product: "Trend Micro ServerProtect for Network Appliance Filers", vendor: "Trend Micro", versions: [ { status: "affected", version: "5.8", }, ], }, ], descriptions: [ { lang: "en", value: "Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote attacker to crash the process or achieve remote code execution.", }, ], problemTypes: [ { descriptions: [ { description: "Command Integer Overflow", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-24T02:45:22", orgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", shortName: "trendmicro", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/solution/000290507", }, { tags: [ "x_refsource_MISC", ], url: "https://www.tenable.com/security/research/tra-2022-05", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@trendmicro.com", ID: "CVE-2022-25330", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Trend Micro ServerProtect for Storage", version: { version_data: [ { version_value: "6.0", }, ], }, }, { product_name: "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare", version: { version_data: [ { version_value: "5.8", }, ], }, }, { product_name: "Trend Micro ServerProtect for EMC Celerra", version: { version_data: [ { version_value: "5.8", }, ], }, }, { product_name: "Trend Micro ServerProtect for Network Appliance Filers", version: { version_data: [ { version_value: "5.8", }, ], }, }, ], }, vendor_name: "Trend Micro", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Integer overflow conditions that exist in Trend Micro ServerProtect 6.0/5.8 Information Server could allow a remote attacker to crash the process or achieve remote code execution.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Command Integer Overflow", }, ], }, ], }, references: { reference_data: [ { name: "https://success.trendmicro.com/solution/000290507", refsource: "MISC", url: "https://success.trendmicro.com/solution/000290507", }, { name: "https://www.tenable.com/security/research/tra-2022-05", refsource: "MISC", url: "https://www.tenable.com/security/research/tra-2022-05", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", assignerShortName: "trendmicro", cveId: "CVE-2022-25330", datePublished: "2022-02-24T02:45:22", dateReserved: "2022-02-18T00:00:00", dateUpdated: "2024-08-03T04:36:06.908Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-9032 (GCVE-0-2017-9032)
Vulnerability from cvelistv5
Published
2017-05-25 19:00
Modified
2024-08-05 16:55
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1038548 | vdb-entry, x_refsource_SECTRACK | |
https://success.trendmicro.com/solution/1117411 | x_refsource_CONFIRM | |
https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2017/May/91 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:55:22.242Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1038548", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038548", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://success.trendmicro.com/solution/1117411", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-05-23T00:00:00", descriptions: [ { lang: "en", value: "Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-05-25T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1038548", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038548", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://success.trendmicro.com/solution/1117411", }, { tags: [ "x_refsource_MISC", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-9032", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1038548", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038548", }, { name: "https://success.trendmicro.com/solution/1117411", refsource: "CONFIRM", url: "https://success.trendmicro.com/solution/1117411", }, { name: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", refsource: "MISC", url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2017/May/91", }, { name: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-9032", datePublished: "2017-05-25T19:00:00", dateReserved: "2017-05-17T00:00:00", dateUpdated: "2024-08-05T16:55:22.242Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-25225 (GCVE-0-2021-25225)
Vulnerability from cvelistv5
Published
2021-01-27 19:10
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284207 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-086/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro ServerProtect for Linux |
Version: 3.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T19:56:11.151Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/solution/000284207", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-086/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Trend Micro ServerProtect for Linux", vendor: "Trend Micro", versions: [ { status: "affected", version: "3.0", }, ], }, ], descriptions: [ { lang: "en", value: "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.", }, ], problemTypes: [ { descriptions: [ { description: "Memory Exhaustion DOS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-27T19:10:24", orgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", shortName: "trendmicro", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/solution/000284207", }, { tags: [ "x_refsource_MISC", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-086/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@trendmicro.com", ID: "CVE-2021-25225", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Trend Micro ServerProtect for Linux", version: { version_data: [ { version_value: "3.0", }, ], }, }, ], }, vendor_name: "Trend Micro", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scheduled scan component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Memory Exhaustion DOS", }, ], }, ], }, references: { reference_data: [ { name: "https://success.trendmicro.com/solution/000284207", refsource: "MISC", url: "https://success.trendmicro.com/solution/000284207", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-21-086/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-21-086/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", assignerShortName: "trendmicro", cveId: "CVE-2021-25225", datePublished: "2021-01-27T19:10:24", dateReserved: "2021-01-15T00:00:00", dateUpdated: "2024-08-03T19:56:11.151Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-9036 (GCVE-0-2017-9036)
Vulnerability from cvelistv5
Published
2017-05-25 19:00
Modified
2024-08-05 16:55
Severity ?
EPSS score ?
Summary
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows local users to gain privileges by leveraging an unrestricted quarantine directory.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1038548 | vdb-entry, x_refsource_SECTRACK | |
https://success.trendmicro.com/solution/1117411 | x_refsource_CONFIRM | |
https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2017/May/91 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:55:21.928Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1038548", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038548", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://success.trendmicro.com/solution/1117411", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-05-23T00:00:00", descriptions: [ { lang: "en", value: "Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows local users to gain privileges by leveraging an unrestricted quarantine directory.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-05-25T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1038548", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038548", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://success.trendmicro.com/solution/1117411", }, { tags: [ "x_refsource_MISC", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-9036", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows local users to gain privileges by leveraging an unrestricted quarantine directory.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1038548", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038548", }, { name: "https://success.trendmicro.com/solution/1117411", refsource: "CONFIRM", url: "https://success.trendmicro.com/solution/1117411", }, { name: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", refsource: "MISC", url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2017/May/91", }, { name: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-9036", datePublished: "2017-05-25T19:00:00", dateReserved: "2017-05-17T00:00:00", dateUpdated: "2024-08-05T16:55:21.928Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-9035 (GCVE-0-2017-9035)
Vulnerability from cvelistv5
Published
2017-05-25 19:00
Modified
2024-08-05 16:55
Severity ?
EPSS score ?
Summary
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to eavesdrop and tamper with updates by leveraging unencrypted communications with update servers.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1038548 | vdb-entry, x_refsource_SECTRACK | |
https://success.trendmicro.com/solution/1117411 | x_refsource_CONFIRM | |
https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2017/May/91 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:55:22.080Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1038548", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038548", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://success.trendmicro.com/solution/1117411", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-05-23T00:00:00", descriptions: [ { lang: "en", value: "Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to eavesdrop and tamper with updates by leveraging unencrypted communications with update servers.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-05-25T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1038548", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038548", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://success.trendmicro.com/solution/1117411", }, { tags: [ "x_refsource_MISC", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-9035", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to eavesdrop and tamper with updates by leveraging unencrypted communications with update servers.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1038548", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038548", }, { name: "https://success.trendmicro.com/solution/1117411", refsource: "CONFIRM", url: "https://success.trendmicro.com/solution/1117411", }, { name: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", refsource: "MISC", url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2017/May/91", }, { name: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-9035", datePublished: "2017-05-25T19:00:00", dateReserved: "2017-05-17T00:00:00", dateUpdated: "2024-08-05T16:55:22.080Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-25252 (GCVE-0-2021-25252)
Vulnerability from cvelistv5
Published
2021-03-03 15:43
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000285675 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro Virus Scan API (VSAPI) Engine |
Version: 12.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T19:56:11.072Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/solution/000285675", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Trend Micro Virus Scan API (VSAPI) Engine\r\n", vendor: "Trend Micro", versions: [ { status: "affected", version: "12.0", }, ], }, ], descriptions: [ { lang: "en", value: "Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.", }, ], problemTypes: [ { descriptions: [ { description: "Memory Exhaustion", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-03-03T15:43:40", orgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", shortName: "trendmicro", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/solution/000285675", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@trendmicro.com", ID: "CVE-2021-25252", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Trend Micro Virus Scan API (VSAPI) Engine\r\n", version: { version_data: [ { version_value: "12.0", }, ], }, }, ], }, vendor_name: "Trend Micro", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Trend Micro's Virus Scan API (VSAPI) and Advanced Threat Scan Engine (ATSE) - are vulnerable to a memory exhaustion vulnerability that may lead to denial-of-service or system freeze if exploited by an attacker using a specially crafted file.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Memory Exhaustion", }, ], }, ], }, references: { reference_data: [ { name: "https://success.trendmicro.com/solution/000285675", refsource: "MISC", url: "https://success.trendmicro.com/solution/000285675", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", assignerShortName: "trendmicro", cveId: "CVE-2021-25252", datePublished: "2021-03-03T15:43:40", dateReserved: "2021-01-15T00:00:00", dateUpdated: "2024-08-03T19:56:11.072Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2022-25331 (GCVE-0-2022-25331)
Vulnerability from cvelistv5
Published
2022-02-24 02:45
Modified
2024-08-03 04:36
Severity ?
EPSS score ?
Summary
Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000290507 | x_refsource_MISC | |
https://www.tenable.com/security/research/tra-2022-05 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
▼ | Trend Micro | Trend Micro ServerProtect for Storage |
Version: 6.0 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T04:36:06.923Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/solution/000290507", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.tenable.com/security/research/tra-2022-05", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Trend Micro ServerProtect for Storage", vendor: "Trend Micro", versions: [ { status: "affected", version: "6.0", }, ], }, { product: "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare", vendor: "Trend Micro", versions: [ { status: "affected", version: "5.8", }, ], }, { product: "Trend Micro ServerProtect for EMC Celerra", vendor: "Trend Micro", versions: [ { status: "affected", version: "5.8", }, ], }, { product: "Trend Micro ServerProtect for Network Appliance Filers", vendor: "Trend Micro", versions: [ { status: "affected", version: "5.8", }, ], }, ], descriptions: [ { lang: "en", value: "Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process.", }, ], problemTypes: [ { descriptions: [ { description: "Command DoS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-02-24T02:45:24", orgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", shortName: "trendmicro", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/solution/000290507", }, { tags: [ "x_refsource_MISC", ], url: "https://www.tenable.com/security/research/tra-2022-05", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@trendmicro.com", ID: "CVE-2022-25331", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Trend Micro ServerProtect for Storage", version: { version_data: [ { version_value: "6.0", }, ], }, }, { product_name: "Trend Micro ServerProtect for Microsoft Windows / Novell NetWare", version: { version_data: [ { version_value: "5.8", }, ], }, }, { product_name: "Trend Micro ServerProtect for EMC Celerra", version: { version_data: [ { version_value: "5.8", }, ], }, }, { product_name: "Trend Micro ServerProtect for Network Appliance Filers", version: { version_data: [ { version_value: "5.8", }, ], }, }, ], }, vendor_name: "Trend Micro", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Uncaught exceptions that can be generated in Trend Micro ServerProtection 6.0/5.8 Information Server could allow a remote attacker to crash the process.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Command DoS", }, ], }, ], }, references: { reference_data: [ { name: "https://success.trendmicro.com/solution/000290507", refsource: "MISC", url: "https://success.trendmicro.com/solution/000290507", }, { name: "https://www.tenable.com/security/research/tra-2022-05", refsource: "MISC", url: "https://www.tenable.com/security/research/tra-2022-05", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", assignerShortName: "trendmicro", cveId: "CVE-2022-25331", datePublished: "2022-02-24T02:45:24", dateReserved: "2022-02-18T00:00:00", dateUpdated: "2024-08-03T04:36:06.923Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-25226 (GCVE-0-2021-25226)
Vulnerability from cvelistv5
Published
2021-01-27 19:10
Modified
2024-08-03 19:56
Severity ?
EPSS score ?
Summary
A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000284207 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-087/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro ServerProtect for Linux |
Version: 3.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T19:56:11.095Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/solution/000284207", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-087/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Trend Micro ServerProtect for Linux", vendor: "Trend Micro", versions: [ { status: "affected", version: "3.0", }, ], }, ], descriptions: [ { lang: "en", value: "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.", }, ], problemTypes: [ { descriptions: [ { description: "Memory Exhaustion DOS", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-01-27T19:10:25", orgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", shortName: "trendmicro", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/solution/000284207", }, { tags: [ "x_refsource_MISC", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-087/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@trendmicro.com", ID: "CVE-2021-25226", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Trend Micro ServerProtect for Linux", version: { version_data: [ { version_value: "3.0", }, ], }, }, ], }, vendor_name: "Trend Micro", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A memory exhaustion vulnerability in Trend Micro ServerProtect for Linux 3.0 could allow a local attacker to craft specific files that can cause a denial-of-service on the affected product. The specific flaw exists within a scan engine component. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Memory Exhaustion DOS", }, ], }, ], }, references: { reference_data: [ { name: "https://success.trendmicro.com/solution/000284207", refsource: "MISC", url: "https://success.trendmicro.com/solution/000284207", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-21-087/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-21-087/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", assignerShortName: "trendmicro", cveId: "CVE-2021-25226", datePublished: "2021-01-27T19:10:25", dateReserved: "2021-01-15T00:00:00", dateUpdated: "2024-08-03T19:56:11.095Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2020-8607 (GCVE-0-2020-8607)
Vulnerability from cvelistv5
Published
2020-08-05 14:05
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000260713 | x_refsource_MISC | |
https://success.trendmicro.com/jp/solution/000260748 | x_refsource_MISC | |
https://jvn.jp/vu/JVNVU99160193/ | x_refsource_MISC | |
https://jvn.jp/en/vu/JVNVU99160193/index.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Trend Micro | Trend Micro Apex One |
Version: 2019 (On premise), SaaS |
|||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T10:03:46.363Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/solution/000260713", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/jp/solution/000260748", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://jvn.jp/vu/JVNVU99160193/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://jvn.jp/en/vu/JVNVU99160193/index.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Trend Micro Apex One", vendor: "Trend Micro", versions: [ { status: "affected", version: "2019 (On premise), SaaS", }, ], }, { product: "Trend Micro OfficeScan", vendor: "Trend Micro", versions: [ { status: "affected", version: "XG SP1", }, ], }, { product: "Trend Micro Deep Security", vendor: "Trend Micro", versions: [ { status: "affected", version: "12.x, 11.x. 10.x", }, ], }, { product: "Trend Micro Worry-Free Business Security", vendor: "Trend Micro", versions: [ { status: "affected", version: "10.0 SP1, Services (SaaS)", }, ], }, { product: "Trend Micro Security (Consumer Family)", vendor: "Trend Micro", versions: [ { status: "affected", version: "2020 (v16), 2019 (v15)", }, ], }, { product: "Trend Micro Safe Lock", vendor: "Trend Micro", versions: [ { status: "affected", version: "2.0 SP1, TXOne Ed", }, ], }, { product: "Trend Micro ServerProtect", vendor: "Trend Micro", versions: [ { status: "affected", version: "SPFS 6.0, SPNAF 5.8, SPEMC 5.8, SPNT 5.8", }, ], }, { product: "Trend Micro Portable Security", vendor: "Trend Micro", versions: [ { status: "affected", version: "3.x, 2.x", }, ], }, { product: "Trend Micro HouseCall", vendor: "Trend Micro", versions: [ { status: "affected", version: "8.0", }, ], }, { product: "Trend Micro Anti-Threat Toolkit (ATTK)", vendor: "Trend Micro", versions: [ { status: "affected", version: "1.62.1240 and below", }, ], }, { product: "Trend Micro Rootkit Buster", vendor: "Trend Micro", versions: [ { status: "affected", version: "2.2", }, ], }, ], descriptions: [ { lang: "en", value: "An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.", }, ], problemTypes: [ { descriptions: [ { description: "Improper Input Validation", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-08-05T14:05:22", orgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", shortName: "trendmicro", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/solution/000260713", }, { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/jp/solution/000260748", }, { tags: [ "x_refsource_MISC", ], url: "https://jvn.jp/vu/JVNVU99160193/", }, { tags: [ "x_refsource_MISC", ], url: "https://jvn.jp/en/vu/JVNVU99160193/index.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@trendmicro.com", ID: "CVE-2020-8607", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Trend Micro Apex One", version: { version_data: [ { version_value: "2019 (On premise), SaaS", }, ], }, }, { product_name: "Trend Micro OfficeScan", version: { version_data: [ { version_value: "XG SP1", }, ], }, }, { product_name: "Trend Micro Deep Security", version: { version_data: [ { version_value: "12.x, 11.x. 10.x", }, ], }, }, { product_name: "Trend Micro Worry-Free Business Security", version: { version_data: [ { version_value: "10.0 SP1, Services (SaaS)", }, ], }, }, { product_name: "Trend Micro Security (Consumer Family)", version: { version_data: [ { version_value: "2020 (v16), 2019 (v15)", }, ], }, }, { product_name: "Trend Micro Safe Lock", version: { version_data: [ { version_value: "2.0 SP1, TXOne Ed", }, ], }, }, { product_name: "Trend Micro ServerProtect", version: { version_data: [ { version_value: "SPFS 6.0, SPNAF 5.8, SPEMC 5.8, SPNT 5.8", }, ], }, }, { product_name: "Trend Micro Portable Security", version: { version_data: [ { version_value: "3.x, 2.x", }, ], }, }, { product_name: "Trend Micro HouseCall", version: { version_data: [ { version_value: "8.0", }, ], }, }, { product_name: "Trend Micro Anti-Threat Toolkit (ATTK)", version: { version_data: [ { version_value: "1.62.1240 and below", }, ], }, }, { product_name: "Trend Micro Rootkit Buster", version: { version_data: [ { version_value: "2.2", }, ], }, }, ], }, vendor_name: "Trend Micro", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An input validation vulnerability found in multiple Trend Micro products utilizing a particular version of a specific rootkit protection driver could allow an attacker in user-mode with administrator permissions to abuse the driver to modify a kernel address that may cause a system crash or potentially lead to code execution in kernel mode. An attacker must already have obtained administrator access on the target machine (either legitimately or via a separate unrelated attack) to exploit this vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Improper Input Validation", }, ], }, ], }, references: { reference_data: [ { name: "https://success.trendmicro.com/solution/000260713", refsource: "MISC", url: "https://success.trendmicro.com/solution/000260713", }, { name: "https://success.trendmicro.com/jp/solution/000260748", refsource: "MISC", url: "https://success.trendmicro.com/jp/solution/000260748", }, { name: "https://jvn.jp/vu/JVNVU99160193/", refsource: "MISC", url: "https://jvn.jp/vu/JVNVU99160193/", }, { name: "https://jvn.jp/en/vu/JVNVU99160193/index.html", refsource: "MISC", url: "https://jvn.jp/en/vu/JVNVU99160193/index.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", assignerShortName: "trendmicro", cveId: "CVE-2020-8607", datePublished: "2020-08-05T14:05:23", dateReserved: "2020-02-04T00:00:00", dateUpdated: "2024-08-04T10:03:46.363Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2019-14688 (GCVE-0-2019-14688)
Vulnerability from cvelistv5
Published
2020-02-20 22:50
Modified
2024-08-05 00:26
Severity ?
EPSS score ?
Summary
Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial product installation by an authorized user. The attacker must convince the target to download malicious DLL locally which must be present when the installer is run.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/1123562 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trend Micro | Trend Micro IM Security (IMS), Trend Micro Control Manager (TMCM), Trend Micro OfficeScan (OSCE), Trend Micro Endpoint Sensor (TMES), Trend Micro Security (Consumer), Trend Micro ScanMail for Microsoft Exchange (SMEX), Trend Micro ServerProtect (SP), Trend Micro Mobile Security Enterprise (TMMS Enterprise) |
Version: IMS 1.6.5, TMCM 7.0, OSCE XG, TMES 1.6, Trend Micro Security 2019, SMEX 14.0, SPNT 5.8/6.0, TMMS Enterprise 9.8 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T00:26:37.555Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/solution/1123562", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Trend Micro IM Security (IMS), Trend Micro Control Manager (TMCM), Trend Micro OfficeScan (OSCE), Trend Micro Endpoint Sensor (TMES), Trend Micro Security (Consumer), Trend Micro ScanMail for Microsoft Exchange (SMEX), Trend Micro ServerProtect (SP), Trend Micro Mobile Security Enterprise (TMMS Enterprise) ", vendor: "Trend Micro", versions: [ { status: "affected", version: "IMS 1.6.5, TMCM 7.0, OSCE XG, TMES 1.6, Trend Micro Security 2019, SMEX 14.0, SPNT 5.8/6.0, TMMS Enterprise 9.8", }, ], }, ], descriptions: [ { lang: "en", value: "Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial product installation by an authorized user. The attacker must convince the target to download malicious DLL locally which must be present when the installer is run.", }, ], problemTypes: [ { descriptions: [ { description: "DLL Hijack", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-20T22:50:22", orgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", shortName: "trendmicro", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/solution/1123562", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@trendmicro.com", ID: "CVE-2019-14688", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Trend Micro IM Security (IMS), Trend Micro Control Manager (TMCM), Trend Micro OfficeScan (OSCE), Trend Micro Endpoint Sensor (TMES), Trend Micro Security (Consumer), Trend Micro ScanMail for Microsoft Exchange (SMEX), Trend Micro ServerProtect (SP), Trend Micro Mobile Security Enterprise (TMMS Enterprise) ", version: { version_data: [ { version_value: "IMS 1.6.5, TMCM 7.0, OSCE XG, TMES 1.6, Trend Micro Security 2019, SMEX 14.0, SPNT 5.8/6.0, TMMS Enterprise 9.8", }, ], }, }, ], }, vendor_name: "Trend Micro", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Trend Micro has repackaged installers for several Trend Micro products that were found to utilize a version of an install package that had a DLL hijack vulnerability that could be exploited during a new product installation. The vulnerability was found to ONLY be exploitable during an initial product installation by an authorized user. The attacker must convince the target to download malicious DLL locally which must be present when the installer is run.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "DLL Hijack", }, ], }, ], }, references: { reference_data: [ { name: "https://success.trendmicro.com/solution/1123562", refsource: "MISC", url: "https://success.trendmicro.com/solution/1123562", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", assignerShortName: "trendmicro", cveId: "CVE-2019-14688", datePublished: "2020-02-20T22:50:22", dateReserved: "2019-08-05T00:00:00", dateUpdated: "2024-08-05T00:26:37.555Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2021-36745 (GCVE-0-2021-36745)
Vulnerability from cvelistv5
Published
2021-09-29 10:21
Modified
2024-08-04 01:01
Severity ?
EPSS score ?
Summary
A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.
References
▼ | URL | Tags |
---|---|---|
https://success.trendmicro.com/solution/000289038 | x_refsource_MISC | |
https://success.trendmicro.com/jp/solution/000289030 | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-1115/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
▼ | Trend Micro | Trend Micro ServerProtect for Storage |
Version: 6.0 |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T01:01:59.288Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/solution/000289038", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://success.trendmicro.com/jp/solution/000289030", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Trend Micro ServerProtect for Storage", vendor: "Trend Micro", versions: [ { status: "affected", version: "6.0", }, ], }, { product: "Trend Micro ServerProtect for EMC Celerra", vendor: "Trend Micro", versions: [ { status: "affected", version: "5.8", }, ], }, { product: "Trend Micro ServerProtect for Network Appliance Filers", vendor: "Trend Micro", versions: [ { status: "affected", version: "5.8", }, ], }, { product: "Trend Micro ServerProtect for Microsoft Windows / Novell Netware", vendor: "Trend Micro", versions: [ { status: "affected", version: "5.8", }, ], }, ], descriptions: [ { lang: "en", value: "A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.", }, ], problemTypes: [ { descriptions: [ { description: "Authentication Bypass", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2021-09-29T10:21:30", orgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", shortName: "trendmicro", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/solution/000289038", }, { tags: [ "x_refsource_MISC", ], url: "https://success.trendmicro.com/jp/solution/000289030", }, { tags: [ "x_refsource_MISC", ], url: "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security@trendmicro.com", ID: "CVE-2021-36745", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Trend Micro ServerProtect for Storage", version: { version_data: [ { version_value: "6.0", }, ], }, }, { product_name: "Trend Micro ServerProtect for EMC Celerra", version: { version_data: [ { version_value: "5.8", }, ], }, }, { product_name: "Trend Micro ServerProtect for Network Appliance Filers", version: { version_data: [ { version_value: "5.8", }, ], }, }, { product_name: "Trend Micro ServerProtect for Microsoft Windows / Novell Netware", version: { version_data: [ { version_value: "5.8", }, ], }, }, ], }, vendor_name: "Trend Micro", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in Trend Micro ServerProtect for Storage 6.0, ServerProtect for EMC Celerra 5.8, ServerProtect for Network Appliance Filers 5.8, and ServerProtect for Microsoft Windows / Novell Netware 5.8 could allow a remote attacker to bypass authentication on affected installations.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Authentication Bypass", }, ], }, ], }, references: { reference_data: [ { name: "https://success.trendmicro.com/solution/000289038", refsource: "MISC", url: "https://success.trendmicro.com/solution/000289038", }, { name: "https://success.trendmicro.com/jp/solution/000289030", refsource: "MISC", url: "https://success.trendmicro.com/jp/solution/000289030", }, { name: "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/", refsource: "MISC", url: "https://www.zerodayinitiative.com/advisories/ZDI-21-1115/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "7f7bd7df-cffe-4fdb-ab6d-859363b89272", assignerShortName: "trendmicro", cveId: "CVE-2021-36745", datePublished: "2021-09-29T10:21:30", dateReserved: "2021-07-14T00:00:00", dateUpdated: "2024-08-04T01:01:59.288Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2017-9034 (GCVE-0-2017-9034)
Vulnerability from cvelistv5
Published
2017-05-25 19:00
Modified
2024-08-05 16:55
Severity ?
EPSS score ?
Summary
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to write to arbitrary files and consequently execute arbitrary code with root privileges by leveraging failure to validate software updates.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1038548 | vdb-entry, x_refsource_SECTRACK | |
https://success.trendmicro.com/solution/1117411 | x_refsource_CONFIRM | |
https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2017/May/91 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T16:55:22.058Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1038548", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038548", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://success.trendmicro.com/solution/1117411", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", "x_transferred", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-05-23T00:00:00", descriptions: [ { lang: "en", value: "Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to write to arbitrary files and consequently execute arbitrary code with root privileges by leveraging failure to validate software updates.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-05-25T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1038548", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038548", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://success.trendmicro.com/solution/1117411", }, { tags: [ "x_refsource_MISC", ], url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", tags: [ "mailing-list", "x_refsource_FULLDISC", ], url: "http://seclists.org/fulldisclosure/2017/May/91", }, { tags: [ "x_refsource_MISC", ], url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-9034", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows attackers to write to arbitrary files and consequently execute arbitrary code with root privileges by leveraging failure to validate software updates.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1038548", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038548", }, { name: "https://success.trendmicro.com/solution/1117411", refsource: "CONFIRM", url: "https://success.trendmicro.com/solution/1117411", }, { name: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", refsource: "MISC", url: "https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulnerabilities", }, { name: "20170523 [CORE-2017-0002] - Trend Micro ServerProtect Multiple Vulnerabilities", refsource: "FULLDISC", url: "http://seclists.org/fulldisclosure/2017/May/91", }, { name: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", refsource: "MISC", url: "http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-Disclosure-CSRF-XSS.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-9034", datePublished: "2017-05-25T19:00:00", dateReserved: "2017-05-17T00:00:00", dateUpdated: "2024-08-05T16:55:22.058Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }