Trend Micro Fixes Security Flaws

Trend Micro has patched numerous flaws in its ServerProtect, Anti-Spyware and PC-cillin products.

Trend Micro has patched several vulnerabilities in its ServerProtect, Anti-Spyware and PC-cillin products that could be exploited remotely to allow hackers to execute arbitrary code.

Several vulnerabilities affected ServerProtect, which provides anti-virus protection for Microsoft Windows and Novell NetWare servers. According to researchers at iDefense Labs, in Sterling, Va., an integer overflow exists within the RPCFN_SYNC_TASK function, which allocates memory based on a user-supplied integer within the request data.

If an attacker causes the overflow, too little memory will be allocated and user-supplied data is copied into the resulting buffer using lstrcpyW(). The end result is an exploitable heap buffer overflow, researchers wrote in an advisory.

A number of boundary errors can also be used to trigger buffer heap and/or stack-based buffer overflows. All of the vulnerabilities affect ServerProtect for Windows 5.58 Build 1176 (Security Patch 3), iDefense officials said, adding that previous versions and versions for other platforms are suspected to be vulnerable as well. The company has released Security Patch 4 to plug the security gaps.

In addition, Trend Micro recently fixed flaws affecting version 3.5 of its Anti-Spyware offering, as well as PC-cillin Internet Security 2007. Both products are susceptible to stack buffer overflows due to a boundary error within the SSAPI module in vstlib32.dll, which can be caused by creating a file with an overly long path name and results in an exploitable buffer overflow.

"Successful exploitation allows execution of arbitrary code with SYSTEM privileges, but requires that the Venus Spy Trap [VST] functionality of SSAPI is enabled," researchers at the Danish security firm Secunia wrote in an advisory.

Trend Micro has released a hotfix to address the problem.

Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.