First published: Mon Nov 17 2008(Updated: )
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, probably related to an RPC interface.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect for Windows | =5.7 | |
Trend Micro ServerProtect for Windows | =5.58 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5269 has a high severity due to the potential for remote code execution.
To fix CVE-2006-5269, update Trend Micro ServerProtect to the latest version that addresses this vulnerability.
CVE-2006-5269 affects Trend Micro ServerProtect versions 5.7 and 5.58.
CVE-2006-5269 is a heap-based buffer overflow that allows remote attackers to execute arbitrary code.
Yes, CVE-2006-5269 can be exploited remotely through unknown vectors, likely involving an RPC interface.