First published: Wed Aug 22 2007(Updated: )
Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a certain integer field in a request packet to TCP port 5168, which triggers a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect for Windows | =5.58-build_1176_for_windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4219 has a high severity rating due to its potential for remote code execution.
To fix CVE-2007-4219, you should upgrade to Trend Micro ServerProtect version 5.58 Security Patch 4 or later.
The risks associated with CVE-2007-4219 include unauthorized remote code execution on affected systems.
CVE-2007-4219 affects Trend Micro ServerProtect for Windows versions prior to 5.58 Security Patch 4.
CVE-2007-4219 can be exploited by attackers sending crafted requests to the vulnerable TCP port.