[Japanese]
|
JVNDB-2020-009771
|
ServerProtect for Linux vulnerable to heap-based buffer overflow
|
Kernel Hook Module for ServerProtect for Linux provided by Trend Micro Incorporated contains a heap-based buffer overflow vulnerability (CWE-122).
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN.
|
CVSS V3 Severity: Base Metrics 6.7 (Medium) [IPA Score]
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
|
|
Trend Micro, Inc.
- Trend Micro ServerProtect for Linux Version 3.0
|
|
An attacker who can execute high-privileged code may escalate privileges.
|
[Update the software]
Update Kernel Hook Module to the latest version according to the information provided by the developer.
The developer has released the version listed below that contains a fix for this vulnerability.
* KHM 3.0.1.0022
The developer also recommends that users should update the Kernel Hook Module to the version above KHM 3.0.1.0022 if available.
[Apply workaround]
Applying the following workaround may mitigate the impacts of this vulnerability.
* Restrict physical and remote access to the sever where the product is running to trusted users only
|
Trend Micro, Inc.
|
- Heap-based Buffer Overflow(CWE-122) [IPA Evaluation]
- Out-of-bounds Write(CWE-787) [NVD Evaluation]
|
- CVE-2020-28575
|
- JVN : JVNVU#97704455
- National Vulnerability Database (NVD) : CVE-2020-28575
|
- [2020/12/08]
Web page was published
|