Vulnerability CVE-2005-0533


Published: 2005-05-02   Modified: 2012-02-12

Description:
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

Vendor: Trend micro
Product: Control manager 
Version: netware; gold;
Product: Client-server-messaging suite smb 
Version: gold;
Product: Interscan web security suite 
Version: gold;
Product: Interscan webprotect 
Version: gold;
Product: Interscan viruswall 
Version:
gold
5.1
3.6.5
3.6
3.52_build1466
3.52
3.51
3.5
3.4
3.0.1
Product: Scanmail 
Version:
gold
6.1
3.81
3.8
2.6
2.51
Product: Interscan messaging security suite 
Version:
gold
5.5
3.81
Product: Client-server suite smb 
Version: gold;
Product: Officescan 
Version:
corporate_6.5
corporate_5.58
corporate_5.5
corporate_5.02
corporate_3.54
corporate_3.5
corporate_3.13
corporate_3.11
corporate_3.1.1
corporate_3.0
3.0
Product: Pc-cillin 
Version:
6.0
2003
2002
2000
Product: Serverprotect 
Version:
5.3.1
2.5
1.3
1.25_2007-02-16
Product: Interscan emanager 
Version:
3.6
3.51_j
3.51
3.5.2
3.5
Product: Interscan webmanager 
Version:
2.1
2.0
1.2
Product: Portalprotect 
Version: 1.0;
Product: Scanmail emanager 

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution
http://www.securityfocus.com/bid/12643
http://securitytracker.com/id?1013290
http://securitytracker.com/id?1013289
http://secunia.com/advisories/14396
http://xforce.iss.net/xforce/alerts/id/189

Related CVE
CVE-2018-6218
A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system.
CVE-2017-6798
Trend Micro Endpoint Sensor 1.6 before b1290 has a DLL hijacking vulnerability that allows remote attackers to execute arbitrary code, aka Trend Micro Vulnerability Identifier 2015-0208.
CVE-2016-6270
The handle_certificate function in /vmi/manager/engine/management/commands/apns_worker.py in Trend Micro Virtual Mobile Infrastructure before 5.1 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the password...
CVE-2016-6268
Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allows local webserv users to execute arbitrary code with root privileges via a Trojan horse .war file in the Solr webapps directory.
CVE-2016-6267
SnmpUtils in Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) spare_Community, (2) spare_Al...
CVE-2016-6269
Multiple directory traversal vulnerabilities in Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allow remote attackers to read and delete arbitrary files via the tmpfname parameter to (1) lo...
CVE-2016-6266
ccca_ajaxhandler.php in Trend Micro Smart Protection Server 2.5 before build 2200, 2.6 before build 2106, and 3.0 before build 1330 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the (1) host or (2) apikey...
CVE-2016-5840
hotfix_upload.cgi in Trend Micro Deep Discovery Inspector (DDI) 3.7, 3.8 SP1 (3.81), and 3.8 SP2 (3.82) allows remote administrators to execute arbitrary code via shell metacharacters in the filename parameter of the Cotnent-Disposition header.

Copyright 2019, cxsecurity.com

 

Back to Top