First published: Wed Aug 22 2007(Updated: )
Multiple buffer overflows in the ServerProtect service (SpntSvc.exe) in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allow remote attackers to execute arbitrary code via certain RPC requests to certain TCP ports that are processed by the (1) RPCFN_ENG_NewManualScan, (2) RPCFN_ENG_TimedNewManualScan, and (3) RPCFN_SetComputerName functions in (a) StRpcSrv.dll; the (4) RPCFN_CMON_SetSvcImpersonateUser and (5) RPCFN_OldCMON_SetSvcImpersonateUser functions in (b) Stcommon.dll; the (6) RPCFN_ENG_TakeActionOnAFile and (7) RPCFN_ENG_AddTaskExportLogItem functions in (c) Eng50.dll; the (8) NTF_SetPagerNotifyConfig function in (d) Notification.dll; or the (9) RPCFN_CopyAUSrc function in the (e) ServerProtect Agent service.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect for Windows | =5.58-build_1176_for_windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4218 has a high severity rating due to its ability to allow remote code execution.
To fix CVE-2007-4218, upgrade Trend Micro ServerProtect for Windows to version 5.58 Security Patch 4 or later.
CVE-2007-4218 affects Trend Micro ServerProtect for Windows versions prior to 5.58 Security Patch 4.
CVE-2007-4218 allows remote attackers to execute arbitrary code via specific RPC requests.
There are no known effective workarounds for CVE-2007-4218; the best mitigation is to apply the security patch.