Description
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2005-0534 | Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure. |
References
History
No history.
Subscriptions
Trend Micro
Subscribe
Client-server-messaging Suite Smb
Subscribe
Client-server Suite Smb
Subscribe
Control Manager
Subscribe
Interscan Emanager
Subscribe
Interscan Messaging Security Suite
Subscribe
Interscan Viruswall
Subscribe
Interscan Web Security Suite
Subscribe
Interscan Webmanager
Subscribe
Interscan Webprotect
Subscribe
Officescan
Subscribe
Pc-cillin
Subscribe
Portalprotect
Subscribe
Scanmail
Subscribe
Scanmail Emanager
Subscribe
Serverprotect
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T21:13:54.240Z
Reserved: 2005-02-24T00:00:00.000Z
Link: CVE-2005-0533
No data.
Status : Modified
Published: 2005-05-02T04:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2005-0533
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD