This indicates an attack attempt against multiple stack-based buffer-overflow vulnerabilities in Trend Micro ServerProtect.
The vulnerabilities are caused by the application's failure to properly sanitize user input before copying to a smaller sized buffer. Successful exploitation could allow remote attackers to execute arbitrary code on the system with SYSTEM privileges.
Trend Micro ServerProtect for Windows version 5.58
Trend Micro ServerProtect for EMC version 5.58
Trend Micro ServerProtect for Network Appliance Filer version 5.61
Trend Micro ServerProtect for Network Appliance Filer version 5.62
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the patch, available from the vendor's web site: