CVE-2007-4277
https://notcve.org/view.php?id=CVE-2007-4277
The Trend Micro AntiVirus scan engine before 8.550-1001, as used in Trend Micro PC-Cillin Internet Security 2007, and Tmxpflt.sys 8.320.1004 and 8.500.0.1002, has weak permissions (Everyone:Write) for the \\.\Tmfilter device, which allows local users to send arbitrary content to the device via the IOCTL functionality. NOTE: this can be leveraged for privilege escalation by exploiting a buffer overflow in the handler for IOCTL 0xa0284403. La ingenieria de búsqueda de Trend Micro AntiVirus anterior a 8.550-1001, utilizada en Trend Micro PC-Cillin Internet Security 2007, y Tmxpflt.sys 8.320.1004 y 8.500.0.1002, tiene permisos débiles (TODOS:Escritura) para el dispositivo \\.\Tmfilter, lo cual permite a usuarios locales enviar contenido de su elección al dispositivo a través de la funcionalidad IOCTL. • http://esupport.trendmicro.com/support/viewxml.do?ContentID=1035793 http://esupport.trendmicro.com/support/viewxml.do?ContentID=1036190 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=609 http://secunia.com/advisories/27378 http://securitytracker.com/id?1018863 http://www.securityfocus.com/bid/26209 http://www.vupen.com/english/advisories/2007/3627 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-264: Permissions, Privileges, and Access Controls •
CVE-2007-4731 – Trend Micro ServerProtect TMregChange() Stack Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-4731
Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 5005. Desbordamiento de búfer basado en pila en la función TMregChange de TMReg.dll de Trend Micro SErverProtect anterir a 5.58 Security Patch 4 permite a atacantes remotos ejecutar código de su elección mediante un paquete manipulado al puerto TCP 5005. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Server Protect. Authentication is not required to exploit this vulnerability. The specific flaw exists within the routine TMregChange() exported by TMReg.dll which is reachable through the custom protocol subcode "\x15\x00\x00\x00". The TCP socket bound to port 5005 receives user-supplied data which is copied without proper bounds checking to a stack-based buffer. • http://osvdb.org/45878 http://securityreason.com/securityalert/3128 http://securitytracker.com/id?1018594 http://www.securityfocus.com/archive/1/478867/100/0/threaded http://www.zerodayinitiative.com/advisories/ZDI-07-051.html https://exchange.xforce.ibmcloud.com/vulnerabilities/36512 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-4490
https://notcve.org/view.php?id=CVE-2007-4490
Multiple buffer overflows in EarthAgent.exe in Trend Micro ServerProtect 5.58 for Windows before Security Patch 4 allow remote attackers to have an unknown impact via certain RPC function calls to (1) RPCFN_EVENTBACK_DoHotFix or (2) CMD_CHANGE_AGENT_REGISTER_INFO. Múltiples desbordamientos de búfer en EarthAgent.exe de Trend Micro ServerProtect 5.58 para Windows anterior al Parche de Seguridad 4 permite a atacantes remotos tener un impacto desconocido mediante ciertas llamadas a funciones RPC a (1) RPCFN_EVENTBACK_DoHotFix o (2) CMD_CHANGE_AGENT_REGISTER_INFO. • http://secunia.com/advisories/26523 http://securityreason.com/securityalert/3052 http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt http://www.vupen.com/english/advisories/2007/2934 https://exchange.xforce.ibmcloud.com/vulnerabilities/36181 •
CVE-2007-4219
https://notcve.org/view.php?id=CVE-2007-4219
Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a certain integer field in a request packet to TCP port 5168, which triggers a heap-based buffer overflow. Un desbordamiento de enteros en la función RPCFN_SYNC_TASK de la biblioteca StRpcSrv.dll, tal y como es usada en el servicio ServerProtect (archivo SpntSvc.exe), en Trend Micro ServerProtect para Windows versiones anteriores a 5.58 Parche de Seguridad 4, permite a atacantes remotos ejecutar código arbitrario por medio de un determinado campo de enteros en un paquete de petición hacia el puerto TCP 5168, lo que desencadena un desbordamiento de búfer. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=588 http://secunia.com/advisories/26523 http://securityreason.com/securityalert/3052 http://securitytracker.com/id?1018594 http://www.kb.cert.org/vuls/id/959400 http://www.securityfocus.com/bid/25396 http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt http://www.us-cert.gov/cas/techalerts/TA07-235A.html http://www.vupen.com/english/advisories/2007/2934 https://exchange.xf • CWE-189: Numeric Errors •
CVE-2007-4218 – Trend Micro ServerProtect RPCFN_SetComputerName() Stack Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-4218
Multiple buffer overflows in the ServerProtect service (SpntSvc.exe) in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allow remote attackers to execute arbitrary code via certain RPC requests to certain TCP ports that are processed by the (1) RPCFN_ENG_NewManualScan, (2) RPCFN_ENG_TimedNewManualScan, and (3) RPCFN_SetComputerName functions in (a) StRpcSrv.dll; the (4) RPCFN_CMON_SetSvcImpersonateUser and (5) RPCFN_OldCMON_SetSvcImpersonateUser functions in (b) Stcommon.dll; the (6) RPCFN_ENG_TakeActionOnAFile and (7) RPCFN_ENG_AddTaskExportLogItem functions in (c) Eng50.dll; the (8) NTF_SetPagerNotifyConfig function in (d) Notification.dll; or the (9) RPCFN_CopyAUSrc function in the (e) ServerProtect Agent service. Múltiples desbordamientos de búfer en el servicio ServerProtect (archivo SpntSvc.exe) en Trend Micro ServerProtect para Windows versiones anteriores a 5.58 Parche de Seguridad 4, permite a atacantes remotos ejecutar código arbitrario por medio de ciertas peticiones RPC en ciertos puertos TCP que son procesados por las funciones (1) RPCFN_ENG_NewManualScan, (2) RPCFN_ENG_TimedNewManualScan y (3) RPCFN_SetComputerName funciona en (a) la biblioteca StRpcSrv.dll; las funciones (4) RPCFN_CMON_SetSvcImpersonateUser y (5) RPCFN_OldCMON_SetSvcImpersonateUser en (b) la biblioteca Stcommon.dll; las funciones (6) RPCFN_ENG_TakeActionOnAFile y (7) RPCFN_ENG_AddTaskExportLogItem en (c) la biblioteca Eng50.dll; la (8) función NTF_SetPagerNotifyConfig en (d) la biblioteca Notification.dll; o la (9) función RPCFN_CopyAUSrc en el (e) servicio ServerProtect Agent. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro ServerProtect. Authentication is not required to exploit this vulnerability. The specific flaw is exposed through the RPC interface bound on TCP port 5168 and defined in SpntSvc.exe with the following UUID: 25288888-bd5b-11d1-9d53-0080c83a5c2c The vulnerable function, RPCFN_SetComputerName(), is reached when the custom protocols "subcode" is set to "\x30\x00\x0a\x00". Improper use of the MultiByteToWideChar() API results in an exploitable stack based buffer overflow. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=587 http://secunia.com/advisories/26523 http://securityreason.com/securityalert/3052 http://securitytracker.com/id?1018594 http://www.kb.cert.org/vuls/id/109056 http://www.kb.cert.org/vuls/id/204448 http://www.securityfocus.com/archive/1/478866/100/0/threaded http://www.securityfocus.com/bid/25395 http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt http://www.us-cer • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-189: Numeric Errors •