Intrusion Prevention

TrendMicro.ServerProtect.SPNTSVC.Buffer.Overflow

Description

This indicates an attack attempt against multiple stack-based buffer-overflow vulnerabilities in Trend Micro ServerProtect.
The vulnerabilities are caused by the application's failure to properly sanitize user input before copying to a smaller sized buffer. Successful exploitation could allow remote attackers to execute arbitrary code on the system with SYSTEM privileges.

Affected Products

Trend Micro ServerProtect for Windows version 5.58
Trend Micro ServerProtect for EMC version 5.58
Trend Micro ServerProtect for Network Appliance Filer version 5.61
Trend Micro ServerProtect for Network Appliance Filer version 5.62

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the patch, available from the vendor's web site:
http://www.trendmicro.com/download/product.asp?productid=17

CVE References

CVE-2007-2508 CVE-2007-1070