First published: Thu May 04 2000(Updated: )
Buffer overflow in the SMTP gateway for InterScan Virus Wall 3.32 and earlier allows a remote attacker to execute arbitrary commands via a long filename for a uuencoded attachment.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan VirusWall Scan Engine | =3.0.1 | |
Trend Micro InterScan VirusWall Scan Engine | =3.2.3 | |
Trend Micro InterScan VirusWall Scan Engine | =3.3 | |
Trend Micro InterScan VirusWall Scan Engine | =3.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0428 is considered a high severity vulnerability due to the potential for remote code execution.
To fix CVE-2000-0428, you should upgrade to the latest version of Trend Micro InterScan Virus Wall that addresses this buffer overflow issue.
CVE-2000-0428 affects Trend Micro InterScan Virus Wall versions 3.0.1, 3.2.3, 3.3, and 3.32 and earlier.
CVE-2000-0428 enables a remote attacker to execute arbitrary commands on the affected system.
While CVE-2000-0428 is an older vulnerability, systems running the affected versions without patching remain at risk.