A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro ServerProtect. Authentication is not required to exploit this vulnerability. The specific flaw is exposed through the RPC interface bound on TCP port 5168 and defined in SpntSvc.exe.
d8c43d3519d2f41a3b85de1f04c03926c92940f5363dfee44307c401b5a393b1
iDefense Security Advisory 08.21.07 - Remote exploitation of multiple buffer overflow vulnerabilities in Trend Micro Inc.'s ServerProtect anti-virus software could allow attackers to execute arbitrary code with system level privilege. iDefense has confirmed the existence of these vulnerabilities in ServerProtect for Windows 5.58 Build 1176 (Security Patch 3). Previous versions, as well as versions for other platforms, are suspected to be vulnerable.
7f1808fdb1f4124d8b15e150fb6b841b986420fed5f6e4237994682cf8784611