7.5
CWE
119 NVD-CWE-Other
Advisory Published
Updated

CVE-2005-0533: Buffer Overflow

First published: Thu Feb 24 2005(Updated: )

Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Trend Micro Client-Server Messaging Suite SMB=gold
Trend Micro Client-Server Messaging Suite SMB=gold
Trend Micro Control Manager=gold
Trend Micro Control Manager=gold
Trend Micro Control Manager=gold
Trend Micro Control Manager=gold
Trend Micro Control Manager=gold
Trend Micro Control Manager=netware
Trend Micro InterScan eManager=3.5
Trend Micro InterScan eManager=3.5.2
Trend Micro InterScan eManager=3.6
Trend Micro InterScan eManager=3.6
Trend Micro InterScan eManager=3.51
Trend Micro InterScan eManager=3.51_j
Trend Micro InterScan Messaging Security Suite=3.81
Trend Micro InterScan Messaging Security Suite=5.5
Trend Micro InterScan Messaging Security Suite=gold
Trend Micro InterScan Messaging Security Suite=gold
Trend Micro InterScan Messaging Security Suite=gold
Trend Micro InterScan VirusWall Scan Engine=3.0.1
Trend Micro InterScan VirusWall Scan Engine=3.0.1
Trend Micro InterScan VirusWall Scan Engine=3.4
Trend Micro InterScan VirusWall Scan Engine=3.5
Trend Micro InterScan VirusWall Scan Engine=3.6
Trend Micro InterScan VirusWall Scan Engine=3.6
Trend Micro InterScan VirusWall Scan Engine=3.6
Trend Micro InterScan VirusWall Scan Engine=3.6
Trend Micro InterScan VirusWall Scan Engine=3.6.5
Trend Micro InterScan VirusWall Scan Engine=3.51
Trend Micro InterScan VirusWall Scan Engine=3.52
Trend Micro InterScan VirusWall Scan Engine=3.52_build1466
Trend Micro InterScan VirusWall Scan Engine=5.1
Trend Micro InterScan VirusWall Scan Engine=gold
Trend Micro InterScan VirusWall Scan Engine=gold
Trend Micro InterScan VirusWall Scan Engine=gold
Trend Micro InterScan VirusWall Scan Engine=gold
Trend Micro InterScan VirusWall Scan Engine=gold
Trend Micro Web Security Suite=gold
Trend Micro Web Security Suite=gold
Trend Micro Web Security Suite=gold
Trend Micro InterScan WebManager=1.2
Trend Micro InterScan WebManager=2.0
Trend Micro InterScan WebManager=2.1
Trend Micro Interscan Web Protect=gold
Trend Micro OfficeScan XG=3.0
Trend Micro OfficeScan XG=corporate_3.0
Trend Micro OfficeScan XG=corporate_3.1.1
Trend Micro OfficeScan XG=corporate_3.5
Trend Micro OfficeScan XG=corporate_3.5
Trend Micro OfficeScan XG=corporate_3.11
Trend Micro OfficeScan XG=corporate_3.11
Trend Micro OfficeScan XG=corporate_3.13
Trend Micro OfficeScan XG=corporate_3.13
Trend Micro OfficeScan XG=corporate_3.54
Trend Micro OfficeScan XG=corporate_5.02
Trend Micro OfficeScan XG=corporate_5.5
Trend Micro OfficeScan XG=corporate_5.58
Trend Micro OfficeScan XG=corporate_6.5
Trend Micro PC-Cillin=6.0
Trend Micro PC-Cillin=2000
Trend Micro PC-Cillin=2002
Trend Micro PC-Cillin=2003
Trend Micro PortalProtect=1.0
Trend Micro ScanMail for IBM Domino=2.6
Trend Micro ScanMail for IBM Domino=2.51
Trend Micro ScanMail for IBM Domino=3.8
Trend Micro ScanMail for IBM Domino=3.81
Trend Micro ScanMail for IBM Domino=6.1
Trend Micro ScanMail for IBM Domino=gold
Trend Micro ScanMail for IBM Domino=gold
Trend Micro ScanMail for IBM Domino=gold
Trend Micro ScanMail for IBM Domino=gold
Trend Micro ScanMail for IBM Domino=gold
Trend Micro ScanMail for IBM Domino
Trend Micro ServerProtect for Windows=1.3
Trend Micro ServerProtect for Windows=1.25_2007-02-16
Trend Micro ServerProtect for Windows=2.5
Trend Micro ServerProtect for Windows=5.3.1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2005-0533?

    The severity of CVE-2005-0533 is high due to its potential for remote code execution.

  • How do I fix CVE-2005-0533?

    To mitigate CVE-2005-0533, upgrade to a version of the Trend Micro products that is using the VSAPI library version 7.510 or later.

  • Which Trend Micro products are affected by CVE-2005-0533?

    Affected Trend Micro products include Client-Server Messaging Suite SMB, Control Manager, InterScan eManager, and several others listed in the CVE details.

  • What type of attack is associated with CVE-2005-0533?

    CVE-2005-0533 is associated with a heap-based buffer overflow attack that can occur via specially crafted ARJ files.

  • Can CVE-2005-0533 lead to data breaches?

    Yes, CVE-2005-0533 could potentially lead to data breaches as it allows remote attackers to execute arbitrary code.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203