[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

95906

 
 

909

 
 

77986

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2005-1929

Date: (C)2005-12-14   (M)2015-12-16
 
CVSS Score: 7.5Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via "wrapped" length values in Chunked transfer requests. NOTE: the original report suggests that the relay.dll issue is related to a problem in which a Microsoft Foundation Classes (MFC) static library returns invalid values under heavy load. As such, this might not be a vulnerability in Trend Micro's product.

Reference:
SECTRACK-1015358
BID-15865
BID-15866
SECUNIA-18038
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039972.html
http://www.idefense.com/application/poi/display?id=353&type=vulnerabilities
OSVDB-21771
OSVDB-21772
SREASON-256
SREASON-257
ADV-2005-2907

CWE    1
CWE-119

© 2013 SecPod Technologies