Vulnerability Description
SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote attackers to obtain "full file system access" and execute arbitrary code.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trend Micro | Serverprotect | 5.58_security_patch_3 |
Related Weaknesses (CWE)
References
- http://osvdb.org/44318
- http://secunia.com/advisories/26523Vendor Advisory
- http://securityreason.com/securityalert/3475
- http://www.securityfocus.com/archive/1/485250/100/0/threaded
- http://www.securityfocus.com/bid/26912
- http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch
- http://www.zerodayinitiative.com/advisories/ZDI-07-077.html
- http://osvdb.org/44318
- http://secunia.com/advisories/26523Vendor Advisory
- http://securityreason.com/securityalert/3475
- http://www.securityfocus.com/archive/1/485250/100/0/threaded
- http://www.securityfocus.com/bid/26912
- http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch
- http://www.zerodayinitiative.com/advisories/ZDI-07-077.html
FAQ
What is CVE-2007-6507?
CVE-2007-6507 is a vulnerability with a CVSS score of 10.0 (HIGH). SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote a...
How severe is CVE-2007-6507?
CVE-2007-6507 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-6507?
Check the references section above for vendor advisories and patch information. Affected products include: Trend Micro Serverprotect.