Description
Heap-based buffer overflow in an unspecified procedure in Trend Micro ServerProtect 5.7 and 5.58 allows remote attackers to execute arbitrary code via unknown vectors, probably related to an RPC interface.
CVSS Metrics
- Vector
- AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector
- network
- Access Cmplx
- low
- Auth
- none
- Confidentiality
- complete
- Integrity
- complete
- Availability
- complete
- Weaknesses
- CWE-119
Metadata
- Primary Vendor
- TREND_MICRO
- Published
- 11/17/2008
- Last Modified
- 4/9/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
trend_micro : serverprotecttrend_micro : serverprotect
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.