Vulnerability Note VU#959400
Trend Micro ServerProtect Integer Overflow Vulnerability
Trend Micro ServerProtect contains an integer overflow vulnerability that may allow a remote attacker to execute arbitrary code.
Trend Micro ServerProtect is an anti-virus application designed to run on Microsoft Windows servers. The application provides administrators with centralized management of multiple servers. The ServerProtect architecture includes a management console, information server, and the server which has ServerProtect installed.
The ServerProtect executable that runs on the server being protected by the anti-virus engine is called SpntSvc.exe. This executable uses the StRpcSrv.dll library to handle RPC requests on 5168/tcp.
A remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system.
Trend Micro has addressed this vulnerability in Security Patch 4 - Build 1185.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Trend Micro||Affected||-||23 Aug 2007|
CVSS Metrics (Learn More)
This vulnerability was discovered by Jun Mao (iDefense Labs).
This document was written by Joseph Pruszynski.
- CVE IDs: CVE-2007-4219
- Date Public: 21 Aug 2007
- Date First Published: 23 Aug 2007
- Date Last Updated: 23 Aug 2007
- Severity Metric: 5.57
- Document Revision: 26
If you have feedback, comments, or additional information about this vulnerability, please send us email.