Vulnerability Description
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a folder read operation over RPC.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trend Micro | Serverprotect | 5.7 |
Related Weaknesses (CWE)
References
- http://blogs.iss.net/archive/trend.html
- http://secunia.com/advisories/32618Vendor Advisory
- http://www.iss.net/threats/309.html
- http://www.kb.cert.org/vuls/id/768681US Government Resource
- http://www.securityfocus.com/bid/32261
- http://www.vupen.com/english/advisories/2008/3127
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39051
- http://blogs.iss.net/archive/trend.html
- http://secunia.com/advisories/32618Vendor Advisory
- http://www.iss.net/threats/309.html
- http://www.kb.cert.org/vuls/id/768681US Government Resource
- http://www.securityfocus.com/bid/32261
- http://www.vupen.com/english/advisories/2008/3127
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39051
FAQ
What is CVE-2007-0074?
CVE-2007-0074 is a vulnerability with a CVSS score of 10.0 (HIGH). Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a folder rea...
How severe is CVE-2007-0074?
CVE-2007-0074 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-0074?
Check the references section above for vendor advisories and patch information. Affected products include: Trend Micro Serverprotect.