Lucene search

K
saintSAINT CorporationSAINT:90F3E075C3F924D89538D3654BD60FC5
HistoryJul 09, 2007 - 12:00 a.m.

Trend Micro ServerProtect SpntSvc.exe CreateBinding buffer overflow

2007-07-0900:00:00
SAINT Corporation
my.saintcorporation.com
30

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.945 High

EPSS

Percentile

99.2%

Added: 07/09/2007
CVE: CVE-2007-2508
BID: 23868
OSVDB: 35790

Background

Trend Micro ServerProtect is a virus scanner for servers. It includes the SpntSvc.exe daemon which listens for connections on port 5168/TCP.

Problem

A buffer overflow vulnerability in the **CAgRpcClient::CreateBinding** function in the **AgRpcCln.dll** library allows remote attackers to execute arbitrary commands by sending a specially crafted RPC request to the SpntSvc.exe daemon.

Resolution

Apply ServerProtect 5.58 Security Patch 3 (build 1176) or higher.

References

<http://www.zerodayinitiative.com/advisories/ZDI-07-025.html&gt;

Limitations

Exploit works on Trend Micro ServerProtect 5.58 Build 1060.

Platforms

Windows

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.945 High

EPSS

Percentile

99.2%