APP: Trend Micro ServerProtect DCE-RPC Stack Overflow
This signature detects attempts to exploit a known vulnerability in the Trend Micro ServerProtect. A successful attack can lead to a buffer overflow and arbitrary remote code execution as SYSTEM.
Extended Description
Trend Micro ServerProtect is prone to a stack-based buffer-overflow vulnerability because the application fails to properly bounds-check user-supplied input before copying it to an insufficiently sized memory buffer. Exploiting this issue allows attackers to execute arbitrary machine code with SYSTEM-level privileges and to completely compromise affected computers. Failed exploit attempts will result in a denial of service.
Affected Products
Trend_micro serverprotect
References
CVE: CVE-2007-2508
URL: http://www.securityfocus.com/archive/1/archive/1/467932/100/0/threaded http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch2_readme.txt http://esupport.trendmicro.com/support/viewxml.do?contentid=en-1034290 http://www.zerodayinitiative.com/advisories/zdi-07-024.html http://esupport.trendmicro.com/support/viewxml.do?contentid=en-1034757 http://www.zerodayinitiative.com/advisories/zdi-07-025.html
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Trend_micro
10.0