Vulnerabilities > CVE-2005-0533 - Unspecified vulnerability in Trend Micro products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN trend-micro
nessus
Summary
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Vulnerable Configurations
Nessus
NASL family | Windows |
NASL id | TRENDMICRO_ARJ_OVERFLOW.NASL |
description | The remote host is running a version of the Trend Micro engine that has a heap overflow vulnerability in the ARJ handling functions. An attacker may exploit this flaw to bypass virus protection altogether and execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to submit a malformed ARJ archive to a process on the remote host and wait for the antivirus engine to scan it. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 17213 |
published | 2005-02-24 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/17213 |
title | Trend Micro VSAPI ARJ Handling Heap Overflow |
References
- http://secunia.com/advisories/14396
- http://secunia.com/advisories/14396
- http://securitytracker.com/id?1013289
- http://securitytracker.com/id?1013289
- http://securitytracker.com/id?1013290
- http://securitytracker.com/id?1013290
- http://www.securityfocus.com/bid/12643
- http://www.securityfocus.com/bid/12643
- http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution
- http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution
- http://xforce.iss.net/xforce/alerts/id/189
- http://xforce.iss.net/xforce/alerts/id/189