CVE-2007-1070

N/A Unknown
Published: February 21, 2007 Modified: April 23, 2026
View on NVD

Description

Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote attackers to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) CMON_NetTestConnection, (2) CMON_ActiveUpdate, and (3) CMON_ActiveRollback functions in (a) StCommon.dll, and (4) ENG_SetRealTimeScanConfigInfo and (5) ENG_SendEMail functions in (b) eng50.dll.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/33042
Source: cve@mitre.org
http://www.kb.cert.org/vuls/id/349393
Source: cve@mitre.org
US Government Resource
http://www.kb.cert.org/vuls/id/466609
Source: cve@mitre.org
US Government Resource
http://www.kb.cert.org/vuls/id/630025
Source: cve@mitre.org
US Government Resource
http://www.kb.cert.org/vuls/id/730433
Source: cve@mitre.org
US Government Resource
http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034290
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://osvdb.org/33042
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/24243
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/349393
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.kb.cert.org/vuls/id/466609
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.kb.cert.org/vuls/id/630025
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.kb.cert.org/vuls/id/730433
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.securityfocus.com/archive/1/460686/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/460690/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/22639
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1017676
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.tippingpoint.com/security/advisories/TSRT-07-01.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.tippingpoint.com/security/advisories/TSRT-07-02.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2007/0670
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/32594
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/32601
Source: af854a3a-2127-422b-91ae-364da2661108

34 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
75.1%
99th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

trend_micro microsoft