Security vendor Trend Micro has once again found itself patching its own software vulnerabilities.
The company has warned of a vulnerability in three of its enterprise server antivirus products: ServerProtect for Microsoft Windows, NetApp and EMC servers and databases.
An attacker on a local network could exploit the vulnerability by sending a malformed network packet targeting ServerProtect's 'StCommon.dll' component.
Once the exploit has been successfully launched, an attacker could remotely execute code on the compromised server.
Trend Micro has issued a fix for the Windows version of the vulnerability in the support section of its website. The EMC and NetApp versions will not be patched until 19 and 29 March respectively, the company said.
Security firm Secunia noted that the attack had to be carried out on a local network, and rated the vulnerability as 'moderately critical' despite the possibility for remote code execution.
Secunia recommends that users install the patches as soon as they are available.
This is the second time in two weeks that Trend Micro, which makes its money plugging others' security holes, has had to patch vulnerabilities in its own software.
Earlier this month, the company issued a patch for a vulnerability that affected more than 30 of its security products.
New flaws found in Trend Micro antivirus
Got a news tip for our journalists? Share it with us anonymously here.
Partner Content
Promoted Content
Why Australia’s Industrial Leaders Are Turning to Dynamic Aspect for Dynamics 365 Business Central
Fabric workshops help partners tap into data services demand growth.
AI PCs shift from hype to revenue opportunity for partners
Promoted Content
Have ticket queues become your quiet business risk?
Shortfalls in cyber expertise deepen the cost and complexity of security incidents




