Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Multiple buffer overflows in the ServerProtect service (SpntSvc.exe) in Trend Micro ServerProtect for Windows before 5.58 Security Patch 4 allow remote attackers to execute arbitrary code via certain RPC requests to certain TCP ports that are processed by the (1) RPCFN_ENG_NewManualScan, (2) RPCFN_ENG_TimedNewManualScan, and (3) RPCFN_SetComputerName functions in (a) StRpcSrv.dll; the (4) RPCFN_CMON_SetSvcImpersonateUser and (5) RPCFN_OldCMON_SetSvcImpersonateUser functions in (b) Stcommon.dll; the (6) RPCFN_ENG_TakeActionOnAFile and (7) RPCFN_ENG_AddTaskExportLogItem functions in (c) Eng50.dll; the (8) NTF_SetPagerNotifyConfig function in (d) Notification.dll; or the (9) RPCFN_CopyAUSrc function in the (e) ServerProtect Agent service.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Trend Micro ServerProtect多个RPC调用远程缓冲区溢出漏洞
Vulnerability Description
Trend ServerProtect是一款企业级反病毒程序。 ServerProtect处理多个RPC请求时存在缓冲区溢出漏洞,远程攻击者可能利用此漏洞控制服务器。 ServerProtect杀毒软件的Trend ServerProtect服务(SpntSvc.exe)在TCP 5168端口上以uuid接口25288888-bd5b-11d1-9d53-0080c83a5c2c处理RPC请求,在处理RPC请求时会使用StRpcSrv.dll、Stcommon.dll、Eng50.dll和Notifica
CVSS Information
N/A
Vulnerability Type
N/A