[Forgot Password]
Login  Register Subscribe

23631

 
 

119105

 
 

98250

 
 

909

 
 

79281

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-4218

Date: (C)2007-08-22   (M)2017-07-31 


Multiple buffer overflows in the ServerProtect service (SpntSvc.exe) in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allow remote attackers to execute arbitrary code via certain RPC requests to certain TCP ports that are processed by the (1) RPCFN_ENG_NewManualScan, (2) RPCFN_ENG_TimedNewManualScan, and (3) RPCFN_SetComputerName functions in (a) StRpcSrv.dll; the (4) RPCFN_CMON_SetSvcImpersonateUser and (5) RPCFN_OldCMON_SetSvcImpersonateUser functions in (b) Stcommon.dll; the (6) RPCFN_ENG_TakeActionOnAFile and (7) RPCFN_ENG_AddTaskExportLogItem functions in (c) Eng50.dll; the (8) NTF_SetPagerNotifyConfig function in (d) Notification.dll; or the (9) RPCFN_CopyAUSrc function in the (e) ServerProtect Agent service.

CVSS Score: 10.0Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE





Reference:
SECTRACK-1018594
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=587
http://www.securityfocus.com/archive/1/archive/1/478866/100/0/threaded
BID-25395
SECUNIA-26523
SREASON-3052
ADV-2007-2934
IAVM:2007-T-0035
TA07-235A
VU#109056
VU#204448
http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt
http://www.zerodayinitiative.com/advisories/ZDI-07-050.html
serverprotect-agent-rpcfncopyausrc-bo(36178)
serverprotect-eng50dll-bo(36175)
serverprotect-notification-bo(36176)
serverprotect-stcommondll-bo(36174)
serverprotect-strpcsrv-bo(36172)

CWE    1
CWE-20

© 2013 SecPod Technologies