First published: Tue Aug 05 2003(Updated: )
Multiple buffer overflows in ActiveX controls used by Trend Micro HouseCall 5.5 and 5.7, and Damage Cleanup Server 1.0, allow remote attackers to execute arbitrary code via long parameter strings.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro HouseCall | =5.5 | |
Trend Micro HouseCall | =5.7 | |
Trend Micro Damage Cleanup Server | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0646 has a high severity rating due to its potential to allow remote execution of arbitrary code.
To fix CVE-2003-0646, ensure you are using the latest patched version of Trend Micro HouseCall or Damage Cleanup Server.
CVE-2003-0646 affects Trend Micro HouseCall versions 5.5 and 5.7, as well as Damage Cleanup Server version 1.0.
CVE-2003-0646 can be exploited through crafted parameter strings that trigger buffer overflows.
While CVE-2003-0646 was identified years ago, systems still using the vulnerable software versions remain at risk.