Vulnerability Note VU#488424
Trend Micro ServerProtect SpntSvc buffer overflow vulnerability
Trend Micro ServerProtect contains a buffer overflow vulnerability. This vulnerability may allow an attacker to execute arbitrary code on a vulnerable system.
Trend Micro ServerProtect is an anti-virus application that is designed to run on Windows-based servers. The ServerProtect architecture includes a management console, information server, and the server which has ServerProtect installed.
The ServerProtect executable that runs on the server being protected by the anti-virus engine is called SpntSvc.exe.
A remote, unauthenticated attacker may be able to execute arbitrary code with elevated privileges, or create a denial-of-service condition.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Trend Micro||Affected||-||09 May 2007|
CVSS Metrics (Learn More)
Thanks to the Zero Day Initiative for information that was used in this report. The Zero Day Initiative credits Eric DETOISIEN with discovery of this vulnerability.
This document was written by Ryan Giobbi.
- CVE IDs: CVE-2007-2508
- Date Public: 07 May 2007
- Date First Published: 09 May 2007
- Date Last Updated: 14 May 2007
- Severity Metric: 0.67
- Document Revision: 8
If you have feedback, comments, or additional information about this vulnerability, please send us email.