CVE-2005-0533Improper Restriction of Operations within the Bounds of a Memory Buffer in Micro Client-server-messaging Suite SMB

3 documents3 sources
Severity
7.5HIGHNVD
EPSS
7.0%
top 8.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 2
Latest updateMay 1

Description

Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages14 packages

NVDtrend_micro/scanmail6 versions+5
NVDtrend_micro/pc-cillin4 versions+3
NVDtrend_micro/officescan11 versions+10
NVDtrend_micro/serverprotect4 versions+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-h9gg-52h2-vqv9: Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 72022-05-01
CVEList
CVE-2005-0533: Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 72005-02-24
CVE-2005-0533 — Trend vulnerability | cvebase