Trend Micro

Serverprotect

25 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 58.48%
  • Veröffentlicht 22.08.2007 23:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple buffer overflows in the ServerProtect service (SpntSvc.exe) in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allow remote attackers to execute arbitrary code via certain RPC requests to certain TCP ports that are process...

  • EPSS 0.94%
  • Veröffentlicht 22.08.2007 23:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple buffer overflows in EarthAgent.exe in Trend Micro ServerProtect 5.58 for Windows before Security Patch 4 allow remote attackers to have an unknown impact via certain RPC function calls to (1) RPCFN_EVENTBACK_DoHotFix or (2) CMD_CHANGE_AGENT_...

  • EPSS 39.62%
  • Veröffentlicht 22.08.2007 23:17:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a certai...

  • EPSS 19.07%
  • Veröffentlicht 09.05.2007 00:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2- Build 1174 allow remote attackers to execute arbitrary code via a crafted RPC message processed by the (1) the RPCFN_ActiveRollback function in (a) stcommon.dll, or ...

  • EPSS 4.3%
  • Veröffentlicht 08.05.2007 23:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in AgRpcCln.dll for Trend Micro ServerProtect 5.58 for Windows before Security Patch 3 Build 1176 allows remote attackers to execute arbitrary code via unknown vectors related to RPC requests. NOTE: this is probably a different vulner...

Exploit
  • EPSS 78.61%
  • Veröffentlicht 08.05.2007 23:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote attackers to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateB...

  • EPSS 0.26%
  • Veröffentlicht 02.03.2007 21:18:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The web interface in Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 before 20070216 accepts logon requests through unencrypted HTTP, which might allow remote attackers to obtain credentials by sniffing the network.

  • EPSS 1.32%
  • Veröffentlicht 02.03.2007 21:18:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Trend Micro ServerProtect for Linux (SPLX) 1.25, 1.3, and 2.5 before 20070216 allows remote attackers to access arbitrary web pages and reconfigure the product via HTTP requests with the splx_2376_info cookie to the web interface port (14942/tcp).

  • EPSS 74.76%
  • Veröffentlicht 21.02.2007 11:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote attackers to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflo...

  • EPSS 35.25%
  • Veröffentlicht 08.02.2007 18:28:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed ex...