10
CVSSv2

CVE-2007-1070

Published: 21/02/2007 Updated: 16/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote malicious users to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) CMON_NetTestConnection, (2) CMON_ActiveUpdate, and (3) CMON_ActiveRollback functions in (a) StCommon.dll, and (4) ENG_SetRealTimeScanConfigInfo and (5) ENG_SendEMail functions in (b) eng50.dll.

Vulnerable Product Search on Vulmon Subscribe to Product

trend_micro serverprotect 5.58

trend micro serverprotect 5.58

trend micro serverprotect 5.61

trend micro serverprotect 5.62

Exploits

Trend Micro ServerProtect remote stack overflow exploit that takes advantage of a boundary error condition within eng50dll via a specially crafted RPC request to the SpntSvcexe service Binds a shell to TCP port 4444 ...
## # $Id: trendmicro_serverprotectrb 9179 2010-04-30 08:40:19Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core ...
/* * Copyright (c) 2007 devcode * * * ^^ D E V C O D E ^^ * * Trend Micro ServerProtect eng50dll Stack Overflow * [CVE-2007-1070] * * * Description: * A boundary error within a function in eng50dll can be * exploited to cause a stack-based buffer overflow via a * specially crafted RPC request to the SpntSvcexe service ...