Description
Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote attackers to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the AgRpcCln.dll library in SpntSvc.exe; or (2) TCP port 3628, which triggers an overflow in EarthAgent.exe. NOTE: both issues are reachable via TmRpcSrv.dll.
Published: 2007-05-08
Score: 10.0 Critical
EPSS: 79.5% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Trend Micro Serverprotect
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T13:42:33.395Z

Reserved: 2007-05-07T00:00:00.000Z

Link: CVE-2007-2508

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2007-05-08T23:19:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2007-2508

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses