CVE-2007-4219

critical

Description

Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a certain integer field in a request packet to TCP port 5168, which triggers a heap-based buffer overflow.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/36168

http://www.vupen.com/english/advisories/2007/2934

http://www.us-cert.gov/cas/techalerts/TA07-235A.html

http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt

http://www.securityfocus.com/bid/25396

http://www.kb.cert.org/vuls/id/959400

http://securitytracker.com/id?1018594

http://securityreason.com/securityalert/3052

http://secunia.com/advisories/26523

http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=588

Details

Source: Mitre, NVD

Published: 2007-08-22

Updated: 2017-07-29

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical