Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Trend Micro
Subscribe
|
Client-server-messaging Suite Smb
Subscribe
Client-server Suite Smb
Subscribe
Control Manager
Subscribe
Interscan Emanager
Subscribe
Interscan Messaging Security Suite
Subscribe
Interscan Viruswall
Subscribe
Interscan Web Security Suite
Subscribe
Interscan Webmanager
Subscribe
Interscan Webprotect
Subscribe
Officescan
Subscribe
Pc-cillin
Subscribe
Portalprotect
Subscribe
Scanmail
Subscribe
Scanmail Emanager
Subscribe
Serverprotect
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2005-0534 | Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T21:13:54.240Z
Reserved: 2005-02-24T00:00:00
Link: CVE-2005-0533
No data.
Status : Deferred
Published: 2005-05-02T04:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-0533
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD