Lucene search

K
cve[email protected]CVE-2005-1929
HistoryDec 14, 2005 - 9:03 p.m.

CVE-2005-1929

2005-12-1421:03:00
CWE-119
web.nvd.nist.gov
29
cve-2005-1929
heap-based buffer overflows
trend micro
serverprotect management console
control manager
damage cleanup server
remote code execution
chunked transfer requests
security vulnerability

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.3 High

AI Score

Confidence

Low

0.705 High

EPSS

Percentile

98.1%

Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via “wrapped” length values in Chunked transfer requests. NOTE: the original report suggests that the relay.dll issue is related to a problem in which a Microsoft Foundation Classes (MFC) static library returns invalid values under heavy load. As such, this might not be a vulnerability in Trend Micro’s product.

Affected configurations

NVD
Node
trend_microserverprotectRange5.58emc

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7.3 High

AI Score

Confidence

Low

0.705 High

EPSS

Percentile

98.1%