Executive Summary
| Informations | |||
|---|---|---|---|
| Name | CVE-2005-1929 | First vendor Publication | 2005-12-14 |
| Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
| Cvss vector : N/A | |||
|---|---|---|---|
| Overall CVSS Score | NA | ||
| Base Score | NA | Environmental Score | NA |
| impact SubScore | NA | Temporal Score | NA |
| Exploitabality Sub Score | NA | ||
| Calculate full CVSS 3.0 Vectors scores | |||
Security-Database Scoring CVSS v2
| Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
|---|---|---|---|
| Cvss Base Score | 7.5 | Attack Range | Network |
| Cvss Impact Score | 6.4 | Attack Complexity | Low |
| Cvss Expoit Score | 10 | Authentication | None Required |
| Calculate full CVSS 2.0 Vectors scores | |||
Detail
| Multiple heap-based buffer overflows in (1) isaNVWRequest.dll and (2) relay.dll in Trend Micro ServerProtect Management Console 5.58 and earlier, as used in Control Manager 2.5 and 3.0 and Damage Cleanup Server 1.1, allow remote attackers to execute arbitrary code via "wrapped" length values in Chunked transfer requests. NOTE: the original report suggests that the relay.dll issue is related to a problem in which a Microsoft Foundation Classes (MFC) static library returns invalid values under heavy load. As such, this might not be a vulnerability in Trend Micro's product. |
Original Source
| Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1929 |
CWE : Common Weakness Enumeration
| % | Id | Name |
|---|---|---|
| 100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
SAINT Exploits
| Description | Link |
|---|---|
| Trend Micro ServerProtect Management Console isaNVWRequest.dll chunked POST buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
| Id | Description |
|---|---|
| 21772 | Trend Micro ServerProtect relay.dll POST Request Remote Overflow A remote overflow exists in ServerProtect. ServerProtect's /TVCS/relay.dll fails to properly handle POST requests containing chunked encoding with an overly large length value resulting in a buffer overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity. |
| 21771 | Trend Micro ServerProtect isaNVWRequest.dll POST Request Remote Overflow A remote overflow exists in ServerProtect. ServerProtect's /ControlManager/cgi-bin/VA/isaNVWRequest.dll fails to properly handle POST requests containing chunked encoding with an overly large length value resulting in a buffer overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity. |
Snort® IPS/IDS
| Date | Description |
|---|---|
| 2014-01-10 | Trend Micro Control Manager Chunked overflow attempt RuleID : 17486 - Revision : 12 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
| Date | Description |
|---|---|
| 2006-01-13 | Name : The remote web server is vulnerable to remote code execution. File : trendmicro_controlmanager_multiple.nasl - Type : ACT_ATTACK |
Sources (Detail)
Alert History
| Date | Informations |
|---|---|
| 2024-11-28 23:21:27 |
|
| 2024-11-28 12:07:11 |
|
| 2021-05-05 01:01:53 |
|
| 2021-05-04 12:03:01 |
|
| 2021-04-22 01:03:16 |
|
| 2020-05-23 01:36:43 |
|
| 2020-05-23 00:16:38 |
|
| 2016-06-28 15:19:23 |
|
| 2016-04-26 13:36:18 |
|
| 2014-02-17 10:31:46 |
|
| 2014-01-19 21:22:46 |
|
| 2013-05-11 11:27:26 |
|










