Unrated severityNVD Advisory· Published Feb 21, 2007· Updated Apr 23, 2026
CVE-2007-1070
CVE-2007-1070
Description
Multiple stack-based buffer overflows in Trend Micro ServerProtect for Windows and EMC 5.58, and for Network Appliance Filer 5.61 and 5.62, allow remote attackers to execute arbitrary code via crafted RPC requests to TmRpcSrv.dll that trigger overflows when calling the (1) CMON_NetTestConnection, (2) CMON_ActiveUpdate, and (3) CMON_ActiveRollback functions in (a) StCommon.dll, and (4) ENG_SetRealTimeScanConfigInfo and (5) ENG_SendEMail functions in (b) eng50.dll.
Affected products
3cpe:2.3:a:trend_micro:serverprotect:5.58:*:emc:*:*:*:*:*+ 2 more
- cpe:2.3:a:trend_micro:serverprotect:5.58:*:emc:*:*:*:*:*
- cpe:2.3:a:trend_micro:serverprotect:5.61:*:network_appliance_filer:*:*:*:*:*
- cpe:2.3:a:trend_micro:serverprotect:5.62:*:network_appliance_filer:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
17- esupport.trendmicro.com/support/viewxml.donvdPatchVendor Advisory
- www.tippingpoint.com/security/advisories/TSRT-07-01.htmlnvdVendor Advisory
- www.tippingpoint.com/security/advisories/TSRT-07-02.htmlnvdVendor Advisory
- www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch1_readme.txtnvdVendor Advisory
- www.kb.cert.org/vuls/id/349393nvdUS Government Resource
- www.kb.cert.org/vuls/id/466609nvdUS Government Resource
- www.kb.cert.org/vuls/id/630025nvdUS Government Resource
- www.kb.cert.org/vuls/id/730433nvdUS Government Resource
- osvdb.org/33042nvd
- secunia.com/advisories/24243nvd
- www.securityfocus.com/archive/1/460686/100/0/threadednvd
- www.securityfocus.com/archive/1/460690/100/0/threadednvd
- www.securityfocus.com/bid/22639nvd
- www.securitytracker.com/idnvd
- www.vupen.com/english/advisories/2007/0670nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/32594nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/32601nvd
News mentions
0No linked articles in our index yet.