First published: Tue May 08 2007(Updated: )
Buffer overflow in AgRpcCln.dll for Trend Micro ServerProtect 5.58 for Windows before Security Patch 3 Build 1176 allows remote attackers to execute arbitrary code via unknown vectors related to RPC requests. NOTE: this is probably a different vulnerability than CVE-2007-2508.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect for Windows | =5.58 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2528 has a high severity rating due to its potential to allow remote code execution.
To fix CVE-2007-2528, you should apply Security Patch 3 Build 1176 for Trend Micro ServerProtect 5.58.
CVE-2007-2528 affects Trend Micro ServerProtect 5.58 for Windows.
Yes, CVE-2007-2528 can potentially lead to data breaches as it allows attackers to execute arbitrary code.
CVE-2007-2528 is a buffer overflow vulnerability related to RPC requests.