jvndb-2007-000127
Vulnerability from jvndb
Published
2008-05-21 00:00
Modified
2008-05-21 00:00
Severity ?
() - -
Summary
CCC Cleaner buffer overflow vulnerability
Details
CCC Cleaner, provided by Cyber Clean Center between January 25 and February 9, 2007, contains a buffer overflow vulnerability that occurs when it scans UPX-packed executables. This vulnerability is caused by a buffer overflow vulnerability in the scan processing of UPX compressed executables found in TrendMicro Antivirus. For details of this vulnerability, please refer to TrendMicro's website. CCC Cleaner is affected by this vulnerability only when the following file is contained in the "CCC Cleaner" folder. Filenames: lpt$vpn.185 As of February 13, 2006, Trend Micro has announced that the vulnerability "the Anti-Rootkit Common Module (TmComm.sys)" disclosed on February 11, 2006 does not affect CCC Cleaner. For more information, refer to the vendor's website.
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2007/JVNDB-2007-000127.html",
  "dc:date": "2008-05-21T00:00+09:00",
  "dcterms:issued": "2008-05-21T00:00+09:00",
  "dcterms:modified": "2008-05-21T00:00+09:00",
  "description": "CCC Cleaner, provided by Cyber Clean Center between January 25 and February 9, 2007, contains a buffer overflow vulnerability that occurs when it scans UPX-packed executables.\r\n\r\nThis vulnerability is caused by a buffer overflow vulnerability in the scan processing of UPX compressed executables found in TrendMicro Antivirus. For details of this vulnerability, please refer to TrendMicro\u0027s website.\r\n\r\nCCC Cleaner is affected by this vulnerability only when the following file is contained in the \"CCC Cleaner\" folder.\r\n\r\nFilenames:  lpt$vpn.185\r\n\r\nAs of February 13, 2006, Trend Micro has announced that the vulnerability \"the Anti-Rootkit Common Module (TmComm.sys)\" disclosed on February 11, 2006 does not affect CCC Cleaner.  For more information, refer to the vendor\u0027s website.",
  "link": "https://jvndb.jvn.jp/en/contents/2007/JVNDB-2007-000127.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:misc:ccc_cleaner",
      "@product": "CCC Cleaner",
      "@vendor": "Cyber Clean Center",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:scan_engine",
      "@product": "Trend Micro Scan Engine",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:trendmicro:virus_search_engine_vs_api",
      "@product": "Virus Search Engine VS API",
      "@vendor": "Trend Micro, Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "5.4",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2007-000127",
  "sec:references": [
    {
      "#text": "http://jvn.jp/cert/JVNVU%23276432/index.html",
      "@id": "JVNVU#276432",
      "@source": "JVN"
    },
    {
      "#text": "http://jvn.jp/en/jp/JVN77366274/index.html",
      "@id": "JVN#77366274",
      "@source": "JVN"
    },
    {
      "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0851",
      "@id": "CVE-2007-0851",
      "@source": "CVE"
    },
    {
      "#text": "http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0851",
      "@id": "CVE-2007-0851",
      "@source": "NVD"
    },
    {
      "#text": "http://www.kb.cert.org/vuls/id/276432",
      "@id": "VU#276432",
      "@source": "CERT-VN"
    },
    {
      "#text": "http://secunia.com/advisories/24087",
      "@id": "SA24087",
      "@source": "SECUNIA"
    },
    {
      "#text": "http://www.securityfocus.com/bid/22449",
      "@id": "22449",
      "@source": "BID"
    },
    {
      "#text": "http://securitytracker.com/id?1017601",
      "@id": "1017601",
      "@source": "SECTRACK"
    },
    {
      "#text": "http://www.frsirt.com/english/advisories/2007/0522",
      "@id": "FrSIRT/ADV-2007-0522",
      "@source": "FRSIRT"
    }
  ],
  "title": "CCC Cleaner buffer overflow vulnerability"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.