Vulnerability Details : CVE-2007-2508
Public exploit exists!
Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote attackers to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the AgRpcCln.dll library in SpntSvc.exe; or (2) TCP port 3628, which triggers an overflow in EarthAgent.exe. NOTE: both issues are reachable via TmRpcSrv.dll.
Vulnerability category: OverflowExecute code
Products affected by CVE-2007-2508
- cpe:2.3:a:trend_micro:serverprotect:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-2508
94.61%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2007-2508
-
Trend Micro ServerProtect 5.58 CreateBinding() Buffer Overflow
Disclosure Date: 2007-05-07First seen: 2020-04-26exploit/windows/antivirus/trendmicro_serverprotect_createbindingThis module exploits a buffer overflow in Trend Micro ServerProtect 5.58 Build 1060. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code. Authors: - MC <mc@metasploit.com> -
Trend Micro ServerProtect 5.58 EarthAgent.EXE Buffer Overflow
Disclosure Date: 2007-05-07First seen: 2020-04-26exploit/windows/antivirus/trendmicro_serverprotect_earthagentThis module exploits a buffer overflow in Trend Micro ServerProtect 5.58 Build 1060 EarthAgent.EXE. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code. Authors: - MC <mc@metasploit.com>
CVSS scores for CVE-2007-2508
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2007-2508
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2007-2508
-
http://www.securityfocus.com/archive/1/467932/100/0/threaded
-
http://securitytracker.com/id?1018010
Patch
-
http://www.securityfocus.com/archive/1/467933/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/34162
-
http://www.kb.cert.org/vuls/id/515616
US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/34163
-
http://www.zerodayinitiative.com/advisories/ZDI-07-025.html
Vendor Advisory
-
http://www.zerodayinitiative.com/advisories/ZDI-07-024.html
Vendor Advisory
-
http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch2_readme.txt
Patch;Vendor Advisory
-
http://www.securityfocus.com/bid/23866
Trend Micro ServerProtect EarthAgent.EXE Remote Stack Based Buffer Overflow VulnerabilityExploit
-
http://www.vupen.com/english/advisories/2007/1689
Vendor Advisory
-
http://www.securityfocus.com/bid/23868
Trend Micro ServerProtect SpntSvc.EXE Remote Stack Based Buffer Overflow Vulnerability
-
http://www.kb.cert.org/vuls/id/488424
US Government Resource
Jump to