HIGH · 10.0

CVE-2006-5269

Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, probably related to an RPC inter...

Vulnerability Description

Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, probably related to an RPC interface.

CVSS Score

10.0

HIGH

AV:N/AC:L/Au:N/C:C/I:C/A:C
Confidentiality
COMPLETE
Integrity
COMPLETE
Availability
COMPLETE

Affected Products

VendorProductVersions
Trend MicroServerprotect5.7

Related Weaknesses (CWE)

References

FAQ

What is CVE-2006-5269?

CVE-2006-5269 is a vulnerability with a CVSS score of 10.0 (HIGH). Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, probably related to an RPC inter...

How severe is CVE-2006-5269?

CVE-2006-5269 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2006-5269?

Check the references section above for vendor advisories and patch information. Affected products include: Trend Micro Serverprotect.