Vulnerability Details : CVE-2007-1070
Public exploit exists!
Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote attackers to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) CMON_NetTestConnection, (2) CMON_ActiveUpdate, and (3) CMON_ActiveRollback functions in (a) StCommon.dll, and (4) ENG_SetRealTimeScanConfigInfo and (5) ENG_SendEMail functions in (b) eng50.dll.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2007-1070
Probability of exploitation activity in the next 30 days: 95.45%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2007-1070
-
Trend Micro ServerProtect 5.58 Buffer Overflow
Disclosure Date: 2007-02-20First seen: 2020-04-26exploit/windows/antivirus/trendmicro_serverprotectThis module exploits a buffer overflow in Trend Micro ServerProtect 5.58 Build 1060. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code. Authors: - MC <mc@metasploit.com>
CVSS scores for CVE-2007-1070
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2007-1070
-
http://www.kb.cert.org/vuls/id/630025
US Government Resource
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/32594
-
http://www.kb.cert.org/vuls/id/730433
US Government Resource
-
http://www.securityfocus.com/bid/22639
Trend Micro ServerProtect SPNTSVC.EXE Multiple Stack Buffer Overflow Vulnerabilities
-
http://www.kb.cert.org/vuls/id/466609
US Government Resource
-
http://www.securitytracker.com/id?1017676
-
http://www.securityfocus.com/archive/1/460690/100/0/threaded
-
http://www.tippingpoint.com/security/advisories/TSRT-07-01.html
Vendor Advisory
-
http://www.securityfocus.com/archive/1/460686/100/0/threaded
-
http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txt
Vendor Advisory
-
http://www.kb.cert.org/vuls/id/349393
US Government Resource
-
http://www.tippingpoint.com/security/advisories/TSRT-07-02.html
Vendor Advisory
-
http://www.vupen.com/english/advisories/2007/0670
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/32601
-
http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290
Patch;Vendor Advisory
Products affected by CVE-2007-1070
- cpe:2.3:a:trend_micro:serverprotect:5.58:*:emc:*:*:*:*:*When used together with: Microsoft » Windows 2000When used together with: Microsoft » Windows Nt
- cpe:2.3:a:trend_micro:serverprotect:5.61:*:network_appliance_filer:*:*:*:*:*
- cpe:2.3:a:trend_micro:serverprotect:5.62:*:network_appliance_filer:*:*:*:*:*