Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2005-0533

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2005-0533
Last Modified 05 Sep 2008 04:46:34
Published 02 May 2005 12:00:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2005-0533

Summary

Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

Vulnerable Systems

Application

  • Trend Micro Client-server Suite Smb Gold

  • Trend Micro Client-server-messaging Suite Smb Gold

  • Trend Micro Control Manager Gold

  • Trend Micro Control Manager Netware

  • Trend Micro Interscan Emanager 3.5

  • Trend Micro Interscan Emanager 3.5.2

  • Trend Micro Interscan Emanager 3.51

  • Trend Micro Interscan Emanager 3.51 J

  • Trend Micro Interscan Emanager 3.6

  • Trend Micro Interscan Messaging Security Suite 3.81

  • Trend Micro Interscan Messaging Security Suite 5.5

  • Trend Micro Interscan Messaging Security Suite Gold

  • Trend Micro Interscan Viruswall 3.0.1

  • Trend Micro Interscan Viruswall 3.4

  • Trend Micro Interscan Viruswall 3.5

  • Trend Micro Interscan Viruswall 3.51

  • Trend Micro Interscan Viruswall 3.52

  • Trend Micro Interscan Viruswall 3.52 Build1466

  • Trend Micro Interscan Viruswall 3.6

  • Trend Micro Interscan Viruswall 3.6.5

  • Trend Micro Interscan Viruswall 5.1

  • Trend Micro Interscan Viruswall Gold

  • Trend Micro Interscan Web Security Suite Gold

  • Trend Micro Interscan Webmanager 1.2

  • Trend Micro Interscan Webmanager 2.0

  • Trend Micro Interscan Webmanager 2.1

  • Trend Micro Interscan Webprotect Gold

  • Trend Micro Officescan 3.0

  • Trend Micro Officescan Corporate 3.0

  • Trend Micro Officescan Corporate 3.1.1

  • Trend Micro Officescan Corporate 3.11

  • Trend Micro Officescan Corporate 3.13

  • Trend Micro Officescan Corporate 3.5

  • Trend Micro Officescan Corporate 3.54

  • Trend Micro Officescan Corporate 5.02

  • Trend Micro Officescan Corporate 5.5

  • Trend Micro Officescan Corporate 5.58

  • Trend Micro Officescan Corporate 6.5

  • Trend Micro Pc-cillin 2000

  • Trend Micro Pc-cillin 2002

  • Trend Micro Pc-cillin 2003

  • Trend Micro Pc-cillin 6.0

  • Trend Micro Portalprotect 1.0

  • Trend Micro Scanmail 2.51

  • Trend Micro Scanmail 2.6

  • Trend Micro Scanmail 3.8

  • Trend Micro Scanmail 3.81

  • Trend Micro Scanmail 6.1

  • Trend Micro Scanmail Emanager

  • Trend Micro Scanmail Gold

  • Trend Micro Serverprotect 1.25 2007-02-16

  • Trend Micro Serverprotect 1.3

  • Trend Micro Serverprotect 2.5

  • Trend Micro Serverprotect 5.3.1


References

CONFIRM - http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution

BID - 12643

SECTRACK - 1013290

SECTRACK - 1013289

SECUNIA - 14396

ISS - 20050224 Trend Micro AntiVirus Library Heap Overflow


Last Updated: 27 May 2016 10:39:50