Vulnerabilities > CVE-2005-0533 - Unspecified vulnerability in Trend Micro products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
trend-micro
nessus

Summary

Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

Vulnerable Configurations

Part Description Count
Application
Trend_Micro
78

Nessus

NASL familyWindows
NASL idTRENDMICRO_ARJ_OVERFLOW.NASL
descriptionThe remote host is running a version of the Trend Micro engine that has a heap overflow vulnerability in the ARJ handling functions. An attacker may exploit this flaw to bypass virus protection altogether and execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to submit a malformed ARJ archive to a process on the remote host and wait for the antivirus engine to scan it.
last seen2020-06-01
modified2020-06-02
plugin id17213
published2005-02-24
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/17213
titleTrend Micro VSAPI ARJ Handling Heap Overflow