Lucene search

K
nessusThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.TRENDMICRO_SERVERPROTECT_EARTHAGENT_OVERFLOW.NASL
HistoryMay 09, 2007 - 12:00 a.m.

Trend Micro ServerProtect EarthAgent RPC Request Remote Buffer Overflow

2007-05-0900:00:00
This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
www.tenable.com
70

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.945 High

EPSS

Percentile

99.2%

The remote version of Trend Micro ServerProtect is vulnerable to a stack overflow involving its EarthAgent service. An unauthenticated, remote attacker may be able to leverage this issue with specially- crafted RPC requests to execute arbitrary code on the remote host.

Note that by default, Trend Micro services run with LocalSystem privileges.

#
#  (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(25172);
  script_version("1.16");

  script_bugtraq_id(23866);
  script_cve_id("CVE-2007-2508");

  script_name(english:"Trend Micro ServerProtect EarthAgent RPC Request Remote Buffer Overflow");
  script_summary(english:"Checks version of ServerProtect"); 
 
 script_set_attribute(attribute:"synopsis", value:
"The remote service is vulnerable to a remote buffer overflow attack." );
 script_set_attribute(attribute:"description", value:
"The remote version of Trend Micro ServerProtect is vulnerable to a
stack overflow involving its EarthAgent service.  An unauthenticated,
remote attacker may be able to leverage this issue with specially-
crafted RPC requests to execute arbitrary code on the remote host. 

Note that by default, Trend Micro services run with LocalSystem
privileges." );
 script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-07-024/" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2007/May/97" );
 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f9dc8993" );
 script_set_attribute(attribute:"solution", value:
"Apply Security Patch 2 - Build 1174 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"exploit_framework_core", value:"true");
 script_set_attribute(attribute:"metasploit_name", value:'Trend Micro ServerProtect 5.58 EarthAgent.EXE Buffer Overflow');
 script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
 script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
 script_set_attribute(attribute:"canvas_package", value:'CANVAS');
 script_set_attribute(attribute:"plugin_publication_date", value: "2007/05/09");
 script_set_attribute(attribute:"vuln_publication_date", value: "2007/05/08");
 script_cvs_date("Date: 2018/11/15 20:50:29");
 script_set_attribute(attribute:"patch_publication_date", value: "2004/04/03");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/a:trend_micro:serverprotect:5.58 and previous versions");
script_end_attributes();

 
  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");
  script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");
  script_dependencies("trendmicro_serverprotect_detect.nasl");
  script_require_keys("Antivirus/TrendMicro/ServerProtect");
  script_require_ports(3628);

  exit(0);
}


port = 5168;


# Check the version number.
ver = get_kb_item ("Antivirus/TrendMicro/ServerProtect");
if (ver)
{
 iver = split (ver, sep:".", keep:FALSE);
 for (i=0; i<max_index(iver); i++)
   iver[i] = int(iver[i]);

 # Versions before 5.5 build 1174 are affected.
 if (
      iver[0] < 5 ||
      (
        iver[0] == 5 &&
        (
          iver[1] < 58 ||
          (iver[1] == 58 && iver[2] == 0 && iver[3] < 1174)
        )
      )
    ) security_hole(port);
}
VendorProductVersionCPE
trend_microserverprotect5.58%2520and%2520previous%2520versionscpe:/a:trend_micro:serverprotect:5.58%2520and%2520previous%2520versions

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.945 High

EPSS

Percentile

99.2%