Vulnerabilities > CVE-2007-4219 - Numeric Errors vulnerability in Trend Micro Serverprotect 5.58
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a certain integer field in a request packet to TCP port 5168, which triggers a heap-based buffer overflow.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Windows |
NASL id | TRENDMICRO_SERVERPROTECT_MULTIPLE2.NASL |
description | The remote version of Trend Micro ServerProtect is vulnerable to multiple buffer overflows in the RPC interface. By sending specially crafted requests to the remote host, an attacker may be able to exploit those overflows and execute arbitrary code on the remote host with SYSTEM privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25925 |
published | 2007-08-22 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25925 |
title | Trend Micro ServerProtect Multiple Remote Overflows |
code |
|
References
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=588
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=588
- http://secunia.com/advisories/26523
- http://secunia.com/advisories/26523
- http://securityreason.com/securityalert/3052
- http://securityreason.com/securityalert/3052
- http://securitytracker.com/id?1018594
- http://securitytracker.com/id?1018594
- http://www.kb.cert.org/vuls/id/959400
- http://www.kb.cert.org/vuls/id/959400
- http://www.securityfocus.com/bid/25396
- http://www.securityfocus.com/bid/25396
- http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt
- http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt
- http://www.us-cert.gov/cas/techalerts/TA07-235A.html
- http://www.us-cert.gov/cas/techalerts/TA07-235A.html
- http://www.vupen.com/english/advisories/2007/2934
- http://www.vupen.com/english/advisories/2007/2934
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36168
- https://exchange.xforce.ibmcloud.com/vulnerabilities/36168