MS-RPC: Trend Micro ServerProtect Multiple Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the Trend Micro ServerProtect. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the system.

Extended Description

Multiple buffer overflows in the ServerProtect service (SpntSvc.exe) in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allow remote attackers to execute arbitrary code via certain RPC requests to certain TCP ports that are processed by the (1) RPCFN_ENG_NewManualScan, (2) RPCFN_ENG_TimedNewManualScan, and (3) RPCFN_SetComputerName functions in (a) StRpcSrv.dll; the (4) RPCFN_CMON_SetSvcImpersonateUser and (5) RPCFN_OldCMON_SetSvcImpersonateUser functions in (b) Stcommon.dll; the (6) RPCFN_ENG_TakeActionOnAFile and (7) RPCFN_ENG_AddTaskExportLogItem functions in (c) Eng50.dll; the (8) NTF_SetPagerNotifyConfig function in (d) Notification.dll; or the (9) RPCFN_CopyAUSrc function in the (e) ServerProtect Agent service.

Affected Products

Trend_micro serverprotect

References

CVE: CVE-2007-4218

Short Name
MS-RPC:TRND-MICRO-RPC
Severity
Major
Recommended
True
Recommended Action
Drop
Category
MS-RPC
Keywords
Buffer CVE-2007-4218 Micro Multiple Overflow ServerProtect Trend
Release Date
06/14/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
TCP/5168,3628
False Positive
Unknown
Vendors

Trend_micro

CVSS Score

10.0

Found a potential security threat?