Trend Micro: [Vulnerability Response] Buffer overflow in ServerProtect

Solution ID: 1034290
A recent system upgrade added a ‘1’ or ‘2’ to old solution IDs. You find these solutions by removing or retaining the extra ‘1’ or ‘2’.
Product: ServerProtect for Microsoft Windows – 5.58, ServerProtect for Network Appliance Filer – 5.61, ServerProtect for EMC Celerra – 5.58
Operating System: Windows 2000 Professional Edition – SP4, Windows 2000 Server – SP4, Windows Server 2003 Datacenter Edition, Windows Server 2003 Enterprise Edition, Windows Server 2003 Standard Edition
Published: 2/19/07 9:41 PM
Problem:

A flaw in the “CMON_NetTestConnection()” routine in StCommon.dll may allow attackers to execute arbitrary codes on the application.

This vulnerability affects the following products:

ServerProtect for Windows 5.58

ServerProtect for EMC 5.58

ServerProtect for Network Appliance Filer 5.61

ServerProtect for Network Appliance Filer 5.62

Solution:

To address this issue on ServerProtect for Windows 5.58, download Security Patch 1- Build 1171 (English).

More security patches may be released on the following dates:

2/27/2007

ServerProtect for Windows 5.58 (Traditional Chinese)

3/05/2007

ServerProtect for Windows 5.58 (Simplified Chinese)

3/19/2007

ServerProtect for EMC 5.58 (English)

3/29/2007

ServerProtect for Network Appliance Filer 5.61 (English)

We will soon post updates about the release dates for the security patches of the following products:

ServerProtect for Windows 5.58 (Japanese)

ServerProtect for Network Appliance Filer 5.61 (Japanese)

ServerProtect for Network Appliance Filer 5.62 (Japanese)

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top