Stack-Based Buffer Overflow in Trend Micro ServerProtect
CVE-2007-4731

Currently unrated

Key Information:

Vendor
CVE Published:
12 September 2007

Summary

A stack-based buffer overflow vulnerability exists in the TMregChange function within TMReg.dll in Trend Micro ServerProtect prior to version 5.58 Security Patch 4. This flaw allows remote attackers to exploit the issue by sending crafted packets to TCP port 5005, potentially executing arbitrary code on the affected systems. It emphasizes the importance of applying security patches to prevent unauthorized access and maintain network integrity.

References

EPSS Score

35% chance of being exploited in the next 30 days.

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.