Trend Micro ServerProtect relay.dll POST Request Remote Overflow

2005-12-14T04:03:17
ID OSVDB:21772
Type osvdb
Reporter OSVDB
Modified 2005-12-14T04:03:17

Description

Vulnerability Description

A remote overflow exists in ServerProtect. ServerProtect's /TVCS/relay.dll fails to properly handle POST requests containing chunked encoding with an overly large length value resulting in a buffer overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity.

Solution Description

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workarounds: use the Microsoft URLScan Tool or changing the build environments to Visual C++ 6.0 with Service Pack 6.

Short Description

A remote overflow exists in ServerProtect. ServerProtect's /TVCS/relay.dll fails to properly handle POST requests containing chunked encoding with an overly large length value resulting in a buffer overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity.

References:

Vendor Specific Advisory URL Security Tracker: 1015358 Secunia Advisory ID:18038 Related OSVDB ID: 21770 Related OSVDB ID: 21771 Related OSVDB ID: 21773 Other Advisory URL: http://www.idefense.com/application/poi/display?id=354&type=vulnerabilities Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0570.html Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0589.html CVE-2005-1929