Stack-Based Buffer Overflow in Trend Micro ServerProtect
CVE-2007-4731
Currently unrated
Summary
A stack-based buffer overflow vulnerability exists in the TMregChange function within TMReg.dll in Trend Micro ServerProtect prior to version 5.58 Security Patch 4. This flaw allows remote attackers to exploit the issue by sending crafted packets to TCP port 5005, potentially executing arbitrary code on the affected systems. It emphasizes the importance of applying security patches to prevent unauthorized access and maintain network integrity.
References
EPSS Score
35% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved