SpntSvc.exe daemon in Trend Micro ServerProtect 5.58 for Windows, before Security Patch 4, exposes unspecified dangerous sub-functions from StRpcSrv.dll in the DCE/RPC interface, which allows remote attackers to obtain "full file system access" and execute arbitrary code.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://osvdb.org/44318 | vdb entry |
http://www.securityfocus.com/bid/26912 | vdb entry |
http://www.zerodayinitiative.com/advisories/ZDI-07-077.html | |
http://www.trendmicro.com/ftp/documentation/readme/spnt_558_win_en_securitypatch4_readme.txt | |
http://www.securityfocus.com/archive/1/485250/100/0/threaded | mailing list |
http://securityreason.com/securityalert/3475 | third party advisory |
http://secunia.com/advisories/26523 | third party advisory vendor advisory |