First published: Thu Dec 20 2007(Updated: )
SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote attackers to obtain "full file system access" and execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro ServerProtect for Windows | =5.58_security_patch_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6507 is considered a critical vulnerability due to its potential to allow remote attackers full file system access and the ability to execute arbitrary code.
To fix CVE-2007-6507, update Trend Micro ServerProtect to version 5.58 Security Patch 4 or later.
CVE-2007-6507 affects Trend Micro ServerProtect version 5.58 up to Security Patch 3.
Exploiting CVE-2007-6507 can lead to remote code execution, allowing attackers to compromise the entire file system.
The vulnerability in CVE-2007-6507 is caused by the SpntSvc.exe daemon exposing dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface.