CVE-2007-1070

Scores

EPSS

0.784medium78.4%
0%20%40%60%80%100%

Percentile: 78.4%

CVSS

10.0critical2.0
0246810

CVSS Score: 10.0/10

All CVSS Scores

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote attackers to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) CMON_NetTestConnection, (2) CMON_ActiveUpdate, and (3) CMON_ActiveRollback functions in (a) StCommon.dll, and (4) ENG_SetRealTimeScanConfigInfo and (5) ENG_SendEMail functions in (b) eng50.dll.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

Exploits

Exploit ID: 16827

Source: exploitdb

URL: https://www.exploit-db.com/exploits/16827

Exploit ID: 4367

Source: exploitdb

URL: https://www.exploit-db.com/exploits/4367

Vulnerable Software (2)

Type: Configuration

Vendor: trend_micro

Product: serverprotect

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*"        },        {          "cpe23uri": "cpe:2.3:o:microsoft:windows_...

Source: nvd

Type: Configuration

Vendor: trend_micro

Product: serverprotect

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:trend_micro:serverprotect:5.58:*:emc:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:trend_micro:serverprotect:5.61...

Source: nvd