Search This Blog

Tuesday, December 18, 2007

[NT] Trend Micro ServerProtect StRpcSrv.dll Insecure Method Exposure Vulnerability

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html


- - - - - - - - -

Trend Micro ServerProtect StRpcSrv.dll Insecure Method Exposure
Vulnerability
------------------------------------------------------------------------


SUMMARY

Vulnerabilities allow attackers to execute arbitrary code on vulnerable
installations of Trend Micro ServerProtect. Authentication is not required
to exploit these vulnerabilities.

DETAILS

Vulnerable Systems:
* Trend Micro ServerProtect version 5.58

The specific flaw exists in the SpntSvc.exe daemon, bound by default on
TCP port 5168 and exposing the following DCE/RPC interface through
TmRpcSrv.dll:

/* opcode: 0x00, address: 0x65741030 */
error_status_t sub_65741030 (
[in] handle_t arg_1,
[in] long arg_2,
[in][size_is(arg_4)] byte arg_3[],
[in] long arg_4,
[out][size_is(arg_6)] byte arg_5[],
[in] long arg_6
);

Various sub-functions from StRpcSrv.dll are exposed in this interface and
allow for full file system access that can be trivially leveraged to
executed arbitrary code.

Vendor Response:
Trend Micro issued an update to correct this vulnerability on July 27th,
2007. More details can be found at:

<http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt> http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt

Disclosure Timeline:
2007.02.01 - Vulnerability reported to vendor
2007.12.17 - Public release of advisory


ADDITIONAL INFORMATION

The information has been provided by <mailto:zdi-disclosures@3com.com>
The Zero Day Initiative (ZDI).
The original article can be found at:
<http://www.zerodayinitiative.com/advisories/ZDI-07-077.html>

http://www.zerodayinitiative.com/advisories/ZDI-07-077.html

========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

No comments: