
CVE-2008-0014
https://notcve.org/view.php?id=CVE-2008-0014
17 Nov 2008 — Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to the product's configuration, a different vulnerability than CVE-2008-0012 and CVE-2008-0013. Un Desbordamiento de búfer en la memoria libre para la reserva dinámica (heap) en un procedimiento no especificado de Trend Micro ServerProtect 5.7 y 5.58 permite a atacantes remotos ejecutar código arbitrario a través de vectores ... • http://blogs.iss.net/archive/trend.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2007-6507 – Trend Micro ServerProtect StRpcSrv.dll Insecure Method Exposure Vulnerability
https://notcve.org/view.php?id=CVE-2007-6507
17 Dec 2007 — SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote attackers to obtain "full file system access" and execute arbitrary code. El demonio SpntSvc.exe en Trend Micro ServerProtect 5.58 para Windows, anterior al Security Patch 4, expone sub-funciones peligrosas no especificadas de StRpcSrv.dll en la interfaz DCE/RPC, lo cual permite a atacantes remotos obtener "acce... • http://osvdb.org/44318 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2007-4731 – Trend Micro ServerProtect TMregChange() Stack Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-4731
07 Sep 2007 — Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 5005. Desbordamiento de búfer basado en pila en la función TMregChange de TMReg.dll de Trend Micro SErverProtect anterir a 5.58 Security Patch 4 permite a atacantes remotos ejecutar código de su elección mediante un paquete manipulado al puerto TCP 5005. This vulnerability allows remote attackers to e... • http://osvdb.org/45878 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2007-4218 – Trend Micro ServerProtect RPCFN_SetComputerName() Stack Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-4218
22 Aug 2007 — Multiple buffer overflows in the ServerProtect service (SpntSvc.exe) in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allow remote attackers to execute arbitrary code via certain RPC requests to certain TCP ports that are processed by the (1) RPCFN_ENG_NewManualScan, (2) RPCFN_ENG_TimedNewManualScan, and (3) RPCFN_SetComputerName functions in (a) StRpcSrv.dll; the (4) RPCFN_CMON_SetSvcImpersonateUser and (5) RPCFN_OldCMON_SetSvcImpersonateUser functions in (b) Stcommon.dll; the (6) RPCF... • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=587 • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-189: Numeric Errors •

CVE-2007-4219
https://notcve.org/view.php?id=CVE-2007-4219
22 Aug 2007 — Integer overflow in the RPCFN_SYNC_TASK function in StRpcSrv.dll, as used by the ServerProtect service (SpntSvc.exe), in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a certain integer field in a request packet to TCP port 5168, which triggers a heap-based buffer overflow. Un desbordamiento de enteros en la función RPCFN_SYNC_TASK de la biblioteca StRpcSrv.dll, tal y como es usada en el servicio ServerProtect (archivo SpntSvc.exe), e... • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=588 • CWE-189: Numeric Errors •

CVE-2007-4490
https://notcve.org/view.php?id=CVE-2007-4490
22 Aug 2007 — Multiple buffer overflows in EarthAgent.exe in Trend Micro ServerProtect 5.58 for Windows before Security Patch 4 allow remote attackers to have an unknown impact via certain RPC function calls to (1) RPCFN_EVENTBACK_DoHotFix or (2) CMD_CHANGE_AGENT_REGISTER_INFO. Múltiples desbordamientos de búfer en EarthAgent.exe de Trend Micro ServerProtect 5.58 para Windows anterior al Parche de Seguridad 4 permite a atacantes remotos tener un impacto desconocido mediante ciertas llamadas a funciones RPC a (1) RPCFN_EV... • http://secunia.com/advisories/26523 •

CVE-2007-2533
https://notcve.org/view.php?id=CVE-2007-2533
09 May 2007 — Multiple buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2- Build 1174 allow remote attackers to execute arbitrary code via a crafted RPC message processed by the (1) the RPCFN_ActiveRollback function in (a) stcommon.dll, or the (2) ENG_SetRealTimeScanConfigInfo or (3) ENG_SendEmail functions in (b) eng50.dll. Múltiples desbordamientos de búfer en Trend Micro ServerProtect 5.58 anterior al Security Patch 2-Build 1174 permiten a atacantes remotos ejecutar código de su elección median... • http://osvdb.org/35791 •

CVE-2007-2528
https://notcve.org/view.php?id=CVE-2007-2528
08 May 2007 — Buffer overflow in AgRpcCln.dll for Trend Micro ServerProtect 5.58 for Windows before Security Patch 3 Build 1176 allows remote attackers to execute arbitrary code via unknown vectors related to RPC requests. NOTE: this is probably a different vulnerability than CVE-2007-2508. Desbordamiento de búfer en AgRpcCln.dll para Trend Micro ServerProtect 5.58 para Windows anberior a Security Patch 3 Build 1176 permite a atacantes remotos ejecutar código de su elección a través de vectores desconocidos relacionados ... • http://osvdb.org/35793 •

CVE-2007-2508 – Trend Micro ServerProtect AgRpcCln.dll Stack Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2007-2508
07 May 2007 — Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote attackers to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the AgRpcCln.dll library in SpntSvc.exe; or (2) TCP port 3628, which triggers an overflow in EarthAgent.exe. NOTE: both issues are reachable via TmRpcSrv.dll. Múltiples desbordamientos de búfer en la región?? stack de la memoria en Trend Micro... • https://www.exploit-db.com/exploits/16828 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2007-1070 – Trend Micro ServerProtect - 'eng50.dll' Remote Stack Overflow
https://notcve.org/view.php?id=CVE-2007-1070
21 Feb 2007 — Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote attackers to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) CMON_NetTestConnection, (2) CMON_ActiveUpdate, and (3) CMON_ActiveRollback functions in (a) StCommon.dll, and (4) ENG_SetRealTimeScanConfigInfo and (5) ENG_SendEMail functions in (b) eng50.dll. Múltiples desbordamientos de búfer basado en... • https://www.exploit-db.com/exploits/4367 •