First published: Wed Aug 22 2007(Updated: )
Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a certain integer field in a request packet to TCP port 5168, which triggers a heap-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect | =5.58-build_1176_for_windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.