ID CVE-2007-4219
Summary Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a certain integer field in a request packet to TCP port 5168, which triggers a heap-based buffer overflow.
References
Vulnerable Configurations
  • cpe:2.3:a:trend_micro:serverprotect:5.58:build_1176_for_windows:*:*:*:*:*:*
    cpe:2.3:a:trend_micro:serverprotect:5.58:build_1176_for_windows:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 29-07-2017 - 01:32)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 25396
cert TA07-235A
cert-vn VU#959400
confirm http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt
idefense 20070821 Trend Micro ServerProtect RPCFN_SYNC_TASK Integer Overflow Vulnerability
sectrack 1018594
secunia 26523
sreason 3052
vupen ADV-2007-2934
xf serverprotect-rpcfnsynctask-bo(36168)
Last major update 29-07-2017 - 01:32
Published 22-08-2007 - 23:17
Last modified 29-07-2017 - 01:32
Back to Top