CVE-2007-4731
Trend Micro ServerProtect TMregChange() Stack Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in the TMregChange function in TMReg.dll in Trend Micro ServerProtect before 5.58 Security Patch 4 allows remote attackers to execute arbitrary code via a crafted packet to TCP port 5005.
Desbordamiento de búfer basado en pila en la función TMregChange de TMReg.dll de Trend Micro SErverProtect anterir a 5.58 Security Patch 4 permite a atacantes remotos ejecutar código de su elección mediante un paquete manipulado al puerto TCP 5005.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Server Protect. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the routine TMregChange() exported by TMReg.dll which is reachable through the custom protocol subcode "\x15\x00\x00\x00". The TCP socket bound to port 5005 receives user-supplied data which is copied without proper bounds checking to a stack-based buffer. Thereby resulting in an exploitable condition.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-09-05 CVE Reserved
- 2007-09-07 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-23 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://osvdb.org/45878 | Vdb Entry | |
http://securityreason.com/securityalert/3128 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/478867/100/0/threaded | Mailing List | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36512 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://securitytracker.com/id?1018594 | 2018-10-15 | |
http://www.zerodayinitiative.com/advisories/ZDI-07-051.html | 2018-10-15 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Trend Micro Search vendor "Trend Micro" | Serverprotect Search vendor "Trend Micro" for product "Serverprotect" | <= 5.58_security_patch_3 Search vendor "Trend Micro" for product "Serverprotect" and version " <= 5.58_security_patch_3" | windows |
Affected
|