ServerProtect for Linux vulnerable to heap-based buffer overflow


Kernel Hook Module for ServerProtect for Linux provided by Trend Micro Incorporated contains a heap-based buffer overflow vulnerability (CWE-122).

Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of the solutions through JVN.
CVSS Severity (What is CVSS?)

CVSS V3 Severity:
Base Metrics 6.7 (Medium) [IPA Score]
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: High
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: High
Affected Products

Trend Micro, Inc.
  • Trend Micro ServerProtect for Linux Version 3.0


An attacker who can execute high-privileged code may escalate privileges.

[Update the software]
Update Kernel Hook Module to the latest version according to the information provided by the developer.
The developer has released the version listed below that contains a fix for this vulnerability.


The developer also recommends that users should update the Kernel Hook Module to the version above KHM if available.

[Apply workaround]
Applying the following workaround may mitigate the impacts of this vulnerability.

* Restrict physical and remote access to the sever where the product is running to trusted users only
Vendor Information

Trend Micro, Inc.
CWE (What is CWE?)

  1. Heap-based Buffer Overflow(CWE-122) [IPA Evaluation]
  2. Out-of-bounds Write(CWE-787) [NVD Evaluation]
CVE (What is CVE?)

  1. CVE-2020-28575

  1. JVN : JVNVU#97704455
  2. National Vulnerability Database (NVD) : CVE-2020-28575
Revision History

  • [2020/12/08]
      Web page was published