Vulnerability Description
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, probably related to an RPC interface.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trend Micro | Serverprotect | 5.7 |
Related Weaknesses (CWE)
References
- http://blogs.iss.net/archive/trend.html
- http://secunia.com/advisories/32618Vendor Advisory
- http://www.iss.net/threats/308.html
- http://www.kb.cert.org/vuls/id/768681US Government Resource
- http://www.securityfocus.com/bid/32261
- http://www.vupen.com/english/advisories/2008/3127
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31113
- http://blogs.iss.net/archive/trend.html
- http://secunia.com/advisories/32618Vendor Advisory
- http://www.iss.net/threats/308.html
- http://www.kb.cert.org/vuls/id/768681US Government Resource
- http://www.securityfocus.com/bid/32261
- http://www.vupen.com/english/advisories/2008/3127
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31113
FAQ
What is CVE-2006-5269?
CVE-2006-5269 is a vulnerability with a CVSS score of 10.0 (HIGH). Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, probably related to an RPC inter...
How severe is CVE-2006-5269?
CVE-2006-5269 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-5269?
Check the references section above for vendor advisories and patch information. Affected products include: Trend Micro Serverprotect.