This Metasploit module exploits a buffer overflow in Trend Micro ServerProtect 5.58 Build 1060. By sending a specially crafted RPC request, an attacker could overflow the buffer and execute arbitrary code.
419a85c817ad19675b0359e82b4b443745d0b52cd10ef27cace63ec0950f9943
Trend Micro ServerProtect remote stack overflow exploit that takes advantage of a boundary error condition within eng50.dll via a specially crafted RPC request to the SpntSvc.exe service. Binds a shell to TCP port 4444.
d4cd4342e55c11674ca02c2661b857d3f267c22a415561db270b833b1ee75ce0
These vulnerabilities allow attackers to execute arbitrary code on vulnerable installations of Trend Micro ServerProtect. Authentication is not required to exploit these vulnerabilities. The specific flaws exist within the eng50.dll library.
63da17fc2b11d30b0183ecabd7487368709d4188640674209fe69ac0bfe2c32a
Multiple vulnerabilities allow attackers to execute arbitrary code on vulnerable installations of Trend Micro ServerProtect. Authentication is not required to exploit these vulnerabilities. The specific flaws exist within the StCommon.dll library and are reachable remotely through a DCE/RPC endpoint on TCP port 5168 bound to by the service SpntSvc.exe.
2538733d750d9c2baaf8646c834988989befa2641962eda5f35f1d05adb574ba