First published: Wed Feb 28 2007(Updated: )
Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 before 20070216 allows remote attackers to access arbitrary web pages and reconfigure the product via HTTP requests with the splx_2376_info cookie to the web interface port (14942/tcp).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect for Windows | =1.3 | |
Trend Micro ServerProtect for Windows | =1.25_2007-02-16 | |
Trend Micro ServerProtect for Windows | =2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1168 is considered a high severity vulnerability due to its potential for remote exploitation and unauthorized configuration changes.
To mitigate CVE-2007-1168, it is recommended to upgrade to a fixed version of Trend Micro ServerProtect for Linux after the problematic versions 1.25, 1.3, and 2.5.
CVE-2007-1168 affects Trend Micro ServerProtect for Linux versions 1.25, 1.3, and 2.5 prior to the update on February 16, 2007.
Yes, CVE-2007-1168 can be exploited remotely through HTTP requests to the web interface, making it particularly dangerous.
Exploitation of CVE-2007-1168 may allow attackers to access arbitrary web pages and reconfigure the security product, compromising system integrity.