ID CVE-2005-0533
Summary Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
References
Vulnerable Configurations
  • cpe:2.3:a:trend_micro:client-server-messaging_suite_smb:gold:-:windows
    cpe:2.3:a:trend_micro:client-server-messaging_suite_smb:gold:-:windows
  • cpe:2.3:a:trend_micro:client-server_suite_smb:gold:-:windows
    cpe:2.3:a:trend_micro:client-server_suite_smb:gold:-:windows
  • cpe:2.3:a:trend_micro:control_manager:gold:-:as_400
    cpe:2.3:a:trend_micro:control_manager:gold:-:as_400
  • cpe:2.3:a:trend_micro:control_manager:gold:-:s_390
    cpe:2.3:a:trend_micro:control_manager:gold:-:s_390
  • cpe:2.3:a:trend_micro:control_manager:gold:-:solaris
    cpe:2.3:a:trend_micro:control_manager:gold:-:solaris
  • cpe:2.3:a:trend_micro:control_manager:gold:-:windows
    cpe:2.3:a:trend_micro:control_manager:gold:-:windows
  • cpe:2.3:a:trend_micro:control_manager:gold:-:windows_nt
    cpe:2.3:a:trend_micro:control_manager:gold:-:windows_nt
  • cpe:2.3:a:trend_micro:control_manager:netware
    cpe:2.3:a:trend_micro:control_manager:netware
  • cpe:2.3:a:trend_micro:interscan_emanager:3.5.2:-:windows
    cpe:2.3:a:trend_micro:interscan_emanager:3.5.2:-:windows
  • cpe:2.3:a:trend_micro:interscan_emanager:3.5:-:hp
    cpe:2.3:a:trend_micro:interscan_emanager:3.5:-:hp
  • cpe:2.3:a:trend_micro:interscan_emanager:3.51
    cpe:2.3:a:trend_micro:interscan_emanager:3.51
  • cpe:2.3:a:trend_micro:interscan_emanager:3.51_j
    cpe:2.3:a:trend_micro:interscan_emanager:3.51_j
  • cpe:2.3:a:trend_micro:interscan_emanager:3.6:-:linux
    cpe:2.3:a:trend_micro:interscan_emanager:3.6:-:linux
  • cpe:2.3:a:trend_micro:interscan_emanager:3.6:-:sun
    cpe:2.3:a:trend_micro:interscan_emanager:3.6:-:sun
  • cpe:2.3:a:trend_micro:interscan_messaging_security_suite:3.81
    cpe:2.3:a:trend_micro:interscan_messaging_security_suite:3.81
  • cpe:2.3:a:trend_micro:interscan_messaging_security_suite:5.5
    cpe:2.3:a:trend_micro:interscan_messaging_security_suite:5.5
  • cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:-:linux
    cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:-:linux
  • cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:-:solaris
    cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:-:solaris
  • cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:-:windows
    cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:-:windows
  • cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:-:linux
    cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:-:linux
  • cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:-:unix
    cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:-:unix
  • cpe:2.3:a:trend_micro:interscan_viruswall:3.4:-:windows_nt
    cpe:2.3:a:trend_micro:interscan_viruswall:3.4:-:windows_nt
  • cpe:2.3:a:trend_micro:interscan_viruswall:3.5:-:windows_nt
    cpe:2.3:a:trend_micro:interscan_viruswall:3.5:-:windows_nt
  • cpe:2.3:a:trend_micro:interscan_viruswall:3.51:-:windows_nt
    cpe:2.3:a:trend_micro:interscan_viruswall:3.51:-:windows_nt
  • cpe:2.3:a:trend_micro:interscan_viruswall:3.52:-:windows_nt
    cpe:2.3:a:trend_micro:interscan_viruswall:3.52:-:windows_nt
  • cpe:2.3:a:trend_micro:interscan_viruswall:3.52_build1466:-:windows_nt
    cpe:2.3:a:trend_micro:interscan_viruswall:3.52_build1466:-:windows_nt
  • cpe:2.3:a:trend_micro:interscan_viruswall:3.6.5:-:linux
    cpe:2.3:a:trend_micro:interscan_viruswall:3.6.5:-:linux
  • cpe:2.3:a:trend_micro:interscan_viruswall:3.6:-:hp_ux
    cpe:2.3:a:trend_micro:interscan_viruswall:3.6:-:hp_ux
  • cpe:2.3:a:trend_micro:interscan_viruswall:3.6:-:solaris
    cpe:2.3:a:trend_micro:interscan_viruswall:3.6:-:solaris
  • cpe:2.3:a:trend_micro:interscan_viruswall:3.6:-:unix
    cpe:2.3:a:trend_micro:interscan_viruswall:3.6:-:unix
  • cpe:2.3:a:trend_micro:interscan_viruswall:3.6:-:windows_nt
    cpe:2.3:a:trend_micro:interscan_viruswall:3.6:-:windows_nt
  • cpe:2.3:a:trend_micro:interscan_viruswall:5.1:-:windows_nt
    cpe:2.3:a:trend_micro:interscan_viruswall:5.1:-:windows_nt
  • cpe:2.3:a:trend_micro:interscan_viruswall:gold:-:aix
    cpe:2.3:a:trend_micro:interscan_viruswall:gold:-:aix
  • cpe:2.3:a:trend_micro:interscan_viruswall:gold:-:linux_for_smb
    cpe:2.3:a:trend_micro:interscan_viruswall:gold:-:linux_for_smb
  • cpe:2.3:a:trend_micro:interscan_viruswall:gold:-:smb
    cpe:2.3:a:trend_micro:interscan_viruswall:gold:-:smb
  • cpe:2.3:a:trend_micro:interscan_viruswall:gold:-:windows
    cpe:2.3:a:trend_micro:interscan_viruswall:gold:-:windows
  • cpe:2.3:a:trend_micro:interscan_viruswall:gold:-:windows_nt_for_smb
    cpe:2.3:a:trend_micro:interscan_viruswall:gold:-:windows_nt_for_smb
  • cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:-:linux
    cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:-:linux
  • cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:-:solaris
    cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:-:solaris
  • cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:-:windows
    cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:-:windows
  • cpe:2.3:a:trend_micro:interscan_webmanager:1.2
    cpe:2.3:a:trend_micro:interscan_webmanager:1.2
  • cpe:2.3:a:trend_micro:interscan_webmanager:2.0
    cpe:2.3:a:trend_micro:interscan_webmanager:2.0
  • cpe:2.3:a:trend_micro:interscan_webmanager:2.1
    cpe:2.3:a:trend_micro:interscan_webmanager:2.1
  • cpe:2.3:a:trend_micro:interscan_webprotect:gold:-:isa
    cpe:2.3:a:trend_micro:interscan_webprotect:gold:-:isa
  • cpe:2.3:a:trend_micro:officescan:3.0:-:corporate
    cpe:2.3:a:trend_micro:officescan:3.0:-:corporate
  • cpe:2.3:a:trend_micro:officescan:corporate_3.0:-:windows_nt_server
    cpe:2.3:a:trend_micro:officescan:corporate_3.0:-:windows_nt_server
  • cpe:2.3:a:trend_micro:officescan:corporate_3.1.1:-:windows_nt_server
    cpe:2.3:a:trend_micro:officescan:corporate_3.1.1:-:windows_nt_server
  • cpe:2.3:a:trend_micro:officescan:corporate_3.11
    cpe:2.3:a:trend_micro:officescan:corporate_3.11
  • cpe:2.3:a:trend_micro:officescan:corporate_3.11:-:windows_nt_server
    cpe:2.3:a:trend_micro:officescan:corporate_3.11:-:windows_nt_server
  • cpe:2.3:a:trend_micro:officescan:corporate_3.13
    cpe:2.3:a:trend_micro:officescan:corporate_3.13
  • cpe:2.3:a:trend_micro:officescan:corporate_3.13:-:windows_nt_server
    cpe:2.3:a:trend_micro:officescan:corporate_3.13:-:windows_nt_server
  • cpe:2.3:a:trend_micro:officescan:corporate_3.5
    cpe:2.3:a:trend_micro:officescan:corporate_3.5
  • cpe:2.3:a:trend_micro:officescan:corporate_3.5:-:windows_nt_server
    cpe:2.3:a:trend_micro:officescan:corporate_3.5:-:windows_nt_server
  • cpe:2.3:a:trend_micro:officescan:corporate_3.54
    cpe:2.3:a:trend_micro:officescan:corporate_3.54
  • cpe:2.3:a:trend_micro:officescan:corporate_5.02
    cpe:2.3:a:trend_micro:officescan:corporate_5.02
  • cpe:2.3:a:trend_micro:officescan:corporate_5.5
    cpe:2.3:a:trend_micro:officescan:corporate_5.5
  • cpe:2.3:a:trend_micro:officescan:corporate_5.58
    cpe:2.3:a:trend_micro:officescan:corporate_5.58
  • cpe:2.3:a:trend_micro:officescan:corporate_6.5
    cpe:2.3:a:trend_micro:officescan:corporate_6.5
  • cpe:2.3:a:trend_micro:pc-cillin:2000
    cpe:2.3:a:trend_micro:pc-cillin:2000
  • cpe:2.3:a:trend_micro:pc-cillin:2002
    cpe:2.3:a:trend_micro:pc-cillin:2002
  • cpe:2.3:a:trend_micro:pc-cillin:2003
    cpe:2.3:a:trend_micro:pc-cillin:2003
  • cpe:2.3:a:trend_micro:pc-cillin:6.0
    cpe:2.3:a:trend_micro:pc-cillin:6.0
  • cpe:2.3:a:trend_micro:portalprotect:1.0
    cpe:2.3:a:trend_micro:portalprotect:1.0
  • cpe:2.3:a:trend_micro:scanmail:2.51:-:domino
    cpe:2.3:a:trend_micro:scanmail:2.51:-:domino
  • cpe:2.3:a:trend_micro:scanmail:2.6:-:domino
    cpe:2.3:a:trend_micro:scanmail:2.6:-:domino
  • cpe:2.3:a:trend_micro:scanmail:3.8:-:microsoft_exchange
    cpe:2.3:a:trend_micro:scanmail:3.8:-:microsoft_exchange
  • cpe:2.3:a:trend_micro:scanmail:3.81:-:microsoft_exchange
    cpe:2.3:a:trend_micro:scanmail:3.81:-:microsoft_exchange
  • cpe:2.3:a:trend_micro:scanmail:6.1:-:microsoft_exchange
    cpe:2.3:a:trend_micro:scanmail:6.1:-:microsoft_exchange
  • cpe:2.3:a:trend_micro:scanmail:gold:-:lotus_domino_on_aix
    cpe:2.3:a:trend_micro:scanmail:gold:-:lotus_domino_on_aix
  • cpe:2.3:a:trend_micro:scanmail:gold:-:lotus_domino_on_as_400
    cpe:2.3:a:trend_micro:scanmail:gold:-:lotus_domino_on_as_400
  • cpe:2.3:a:trend_micro:scanmail:gold:-:lotus_domino_on_s_390
    cpe:2.3:a:trend_micro:scanmail:gold:-:lotus_domino_on_s_390
  • cpe:2.3:a:trend_micro:scanmail:gold:-:lotus_domino_on_solaris
    cpe:2.3:a:trend_micro:scanmail:gold:-:lotus_domino_on_solaris
  • cpe:2.3:a:trend_micro:scanmail:gold:-:lotus_domino_on_windows
    cpe:2.3:a:trend_micro:scanmail:gold:-:lotus_domino_on_windows
  • cpe:2.3:a:trend_micro:scanmail_emanager
    cpe:2.3:a:trend_micro:scanmail_emanager
  • cpe:2.3:a:trend_micro:serverprotect:1.25_2007-02-16:-:linux
    cpe:2.3:a:trend_micro:serverprotect:1.25_2007-02-16:-:linux
  • cpe:2.3:a:trend_micro:serverprotect:1.3:-:linux
    cpe:2.3:a:trend_micro:serverprotect:1.3:-:linux
  • cpe:2.3:a:trend_micro:serverprotect:2.5:-:linux
    cpe:2.3:a:trend_micro:serverprotect:2.5:-:linux
  • cpe:2.3:a:trend_micro:serverprotect:5.3.1
    cpe:2.3:a:trend_micro:serverprotect:5.3.1
CVSS
Base: 7.5 (as of 08-06-2005 - 09:14)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
NASL family Windows
NASL id TRENDMICRO_ARJ_OVERFLOW.NASL
description The remote host is running a version of the Trend Micro engine that has a heap overflow vulnerability in the ARJ handling functions. An attacker may exploit this flaw to bypass virus protection altogether and execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to submit a malformed ARJ archive to a process on the remote host and wait for the antivirus engine to scan it.
last seen 2019-02-21
modified 2018-08-01
plugin id 17213
published 2005-02-24
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=17213
title Trend Micro VSAPI ARJ Handling Heap Overflow
refmap via4
bid 12643
confirm http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution
iss 20050224 Trend Micro AntiVirus Library Heap Overflow
sectrack
  • 1013289
  • 1013290
secunia 14396
Last major update 05-09-2008 - 16:46
Published 02-05-2005 - 00:00
Back to Top