Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2007-2508Improper Restriction of Operations within the Bounds of a Memory Buffer in Micro Serverprotect

Severity
10.0CRITICALNVD
EPSS
79.5%
top 0.91%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMay 8
Latest updateMay 1

Description

Multiple stack-based buffer overflows in Trend Micro ServerProtect 5.58 before Security Patch 2 Build 1174 allow remote attackers to execute arbitrary code via crafted data to (1) TCP port 5168, which triggers an overflow in the CAgRpcClient::CreateBinding function in the AgRpcCln.dll library in SpntSvc.exe; or (2) TCP port 3628, which triggers an overflow in EarthAgent.exe. NOTE: both issues are reachable via TmRpcSrv.dll.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-628g-c62g-r2j2: Multiple stack-based buffer overflows in Trend Micro ServerProtect 52022-05-01
CVEList
CVE-2007-2508: Multiple stack-based buffer overflows in Trend Micro ServerProtect 52007-05-08

💥Exploits & PoCs

3
Exploit-DB
Trend Micro ServerProtect 5.58 - 'EarthAgent.exe' Remote Buffer Overflow (Metasploit)2010-04-30
Exploit-DB
Trend Micro ServerProtect 5.58 - 'CreateBinding()' Remote Buffer Overflow (Metasploit)2010-04-30
Exploit-DB
Trend Micro ServerProtect 5.58 - 'SpntSvc.exe' Remote Stack Buffer Overflow2007-05-07
CVE-2007-2508 — Trend Micro Serverprotect vulnerability | cvebase