CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
99.4%
Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote attackers to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) CMON_NetTestConnection, (2) CMON_ActiveUpdate, and (3) CMON_ActiveRollback functions in (a) StCommon.dll, and (4) ENG_SetRealTimeScanConfigInfo and (5) ENG_SendEMail functions in (b) eng50.dll.
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | windows_2000 | * | cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:* |
microsoft | windows_2003_server | r2 | cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:* |
microsoft | windows_2003_server | sp2 | cpe:2.3:o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:* |
microsoft | windows_nt | * | cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:* |
microsoft | windows_vista | * | cpe:2.3:o:microsoft:windows_vista:*:*:32_bit:*:*:*:*:* |
microsoft | windows_xp | * | cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:* |
trend_micro | serverprotect | 5.58 | cpe:2.3:a:trend_micro:serverprotect:5.58:*:emc:*:*:*:*:* |
trend_micro | serverprotect | 5.61 | cpe:2.3:a:trend_micro:serverprotect:5.61:*:network_appliance_filer:*:*:*:*:* |
trend_micro | serverprotect | 5.62 | cpe:2.3:a:trend_micro:serverprotect:5.62:*:network_appliance_filer:*:*:*:*:* |
esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290
osvdb.org/33042
secunia.com/advisories/24243
www.kb.cert.org/vuls/id/349393
www.kb.cert.org/vuls/id/466609
www.kb.cert.org/vuls/id/630025
www.kb.cert.org/vuls/id/730433
www.securityfocus.com/archive/1/460686/100/0/threaded
www.securityfocus.com/archive/1/460690/100/0/threaded
www.securityfocus.com/bid/22639
www.securitytracker.com/id?1017676
www.tippingpoint.com/security/advisories/TSRT-07-01.html
www.tippingpoint.com/security/advisories/TSRT-07-02.html
www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt
www.vupen.com/english/advisories/2007/0670
exchange.xforce.ibmcloud.com/vulnerabilities/32594
exchange.xforce.ibmcloud.com/vulnerabilities/32601