Lucene search

K
saintSAINT CorporationSAINT:2472227D38ECCF5DF4694D5C03D5947B
HistoryDec 28, 2007 - 12:00 a.m.

Trend Micro ServerProtect RPCFN_CMON_SetSvcImpersonateUser buffer overflow

2007-12-2800:00:00
SAINT Corporation
my.saintcorporation.com
19

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.966 High

EPSS

Percentile

99.6%

Added: 12/28/2007
CVE: CVE-2007-4218
BID: 25395
OSVDB: 39752

Background

Trend Micro ServerProtect is a virus scanner for servers.

Problem

A buffer overflow in the ServerProtect service allows remote attackers to execute arbitrary commands by sending a specially crafted RPC request which is processed by the **RPCFN_CMON_SetSvcImpersonateUser** function in the **Stcommon.dll** library.

Resolution

Apply ServerProtect 5.58 Security Patch 4 or higher.

References

<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=587&gt;
<http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt&gt;

Limitations

Exploit works on Trend Micro ServerProtect 5.58 Security Patch 3.

Platforms

Windows
Windows Server 2003 SP1

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.966 High

EPSS

Percentile

99.6%

Related for SAINT:2472227D38ECCF5DF4694D5C03D5947B