Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2007-4218

Overview

Vulnerability Score 10.0 10.0
CVE Id CVE-2007-4218
Last Modified 13 Sep 2011 12:00:00
Published 22 Aug 2007 07:17:00
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2007-4218

Summary

Multiple buffer overflows in the ServerProtect service (SpntSvc.exe) in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allow remote attackers to execute arbitrary code via certain RPC requests to certain TCP ports that are processed by the (1) RPCFN_ENG_NewManualScan, (2) RPCFN_ENG_TimedNewManualScan, and (3) RPCFN_SetComputerName functions in (a) StRpcSrv.dll; the (4) RPCFN_CMON_SetSvcImpersonateUser and (5) RPCFN_OldCMON_SetSvcImpersonateUser functions in (b) Stcommon.dll; the (6) RPCFN_ENG_TakeActionOnAFile and (7) RPCFN_ENG_AddTaskExportLogItem functions in (c) Eng50.dll; the (8) NTF_SetPagerNotifyConfig function in (d) Notification.dll; or the (9) RPCFN_CopyAUSrc function in the (e) ServerProtect Agent service.

Vulnerable Systems

Application

  • Trend Micro Serverprotect 5.58


References

CERT - TA07-235A

CERT-VN - VU#204448

CERT-VN - VU#109056

BID - 25395

SECUNIA - 26523

XF - serverprotect-agent-rpcfncopyausrc-bo(36178)

XF - serverprotect-notification-bo(36176)

XF - serverprotect-eng50dll-bo(36175)

XF - serverprotect-stcommondll-bo(36174)

XF - serverprotect-strpcsrv-bo(36172)

MISC - http://www.zerodayinitiative.com/advisories/ZDI-07-050.html

VUPEN - ADV-2007-2934

CONFIRM - http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt

BUGTRAQ - 20070907 ZDI-07-050: Trend Micro ServerProtect RPCFN_SetComputerName() Stack Overflow Vulnerability

SECTRACK - 1018594

SREASON - 3052

IDEFENSE - 20070821 Trend Micro ServerProtect Multiple Buffer Overflow Vulnerabilities


Last Updated: 27 May 2016 10:45:48