First published: Thu Feb 24 2005(Updated: )
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Client-Server Messaging Suite SMB | =gold | |
Trend Micro Client-Server Messaging Suite SMB | =gold | |
Trend Micro Control Manager | =gold | |
Trend Micro Control Manager | =gold | |
Trend Micro Control Manager | =gold | |
Trend Micro Control Manager | =gold | |
Trend Micro Control Manager | =gold | |
Trend Micro Control Manager | =netware | |
Trend Micro InterScan eManager | =3.5 | |
Trend Micro InterScan eManager | =3.5.2 | |
Trend Micro InterScan eManager | =3.6 | |
Trend Micro InterScan eManager | =3.6 | |
Trend Micro InterScan eManager | =3.51 | |
Trend Micro InterScan eManager | =3.51_j | |
Trend Micro InterScan Messaging Security Suite | =3.81 | |
Trend Micro InterScan Messaging Security Suite | =5.5 | |
Trend Micro InterScan Messaging Security Suite | =gold | |
Trend Micro InterScan Messaging Security Suite | =gold | |
Trend Micro InterScan Messaging Security Suite | =gold | |
Trend Micro InterScan VirusWall Scan Engine | =3.0.1 | |
Trend Micro InterScan VirusWall Scan Engine | =3.0.1 | |
Trend Micro InterScan VirusWall Scan Engine | =3.4 | |
Trend Micro InterScan VirusWall Scan Engine | =3.5 | |
Trend Micro InterScan VirusWall Scan Engine | =3.6 | |
Trend Micro InterScan VirusWall Scan Engine | =3.6 | |
Trend Micro InterScan VirusWall Scan Engine | =3.6 | |
Trend Micro InterScan VirusWall Scan Engine | =3.6 | |
Trend Micro InterScan VirusWall Scan Engine | =3.6.5 | |
Trend Micro InterScan VirusWall Scan Engine | =3.51 | |
Trend Micro InterScan VirusWall Scan Engine | =3.52 | |
Trend Micro InterScan VirusWall Scan Engine | =3.52_build1466 | |
Trend Micro InterScan VirusWall Scan Engine | =5.1 | |
Trend Micro InterScan VirusWall Scan Engine | =gold | |
Trend Micro InterScan VirusWall Scan Engine | =gold | |
Trend Micro InterScan VirusWall Scan Engine | =gold | |
Trend Micro InterScan VirusWall Scan Engine | =gold | |
Trend Micro InterScan VirusWall Scan Engine | =gold | |
Trend Micro Web Security Suite | =gold | |
Trend Micro Web Security Suite | =gold | |
Trend Micro Web Security Suite | =gold | |
Trend Micro InterScan WebManager | =1.2 | |
Trend Micro InterScan WebManager | =2.0 | |
Trend Micro InterScan WebManager | =2.1 | |
Trend Micro Interscan Web Protect | =gold | |
Trend Micro OfficeScan XG | =3.0 | |
Trend Micro OfficeScan XG | =corporate_3.0 | |
Trend Micro OfficeScan XG | =corporate_3.1.1 | |
Trend Micro OfficeScan XG | =corporate_3.5 | |
Trend Micro OfficeScan XG | =corporate_3.5 | |
Trend Micro OfficeScan XG | =corporate_3.11 | |
Trend Micro OfficeScan XG | =corporate_3.11 | |
Trend Micro OfficeScan XG | =corporate_3.13 | |
Trend Micro OfficeScan XG | =corporate_3.13 | |
Trend Micro OfficeScan XG | =corporate_3.54 | |
Trend Micro OfficeScan XG | =corporate_5.02 | |
Trend Micro OfficeScan XG | =corporate_5.5 | |
Trend Micro OfficeScan XG | =corporate_5.58 | |
Trend Micro OfficeScan XG | =corporate_6.5 | |
Trend Micro PC-Cillin | =6.0 | |
Trend Micro PC-Cillin | =2000 | |
Trend Micro PC-Cillin | =2002 | |
Trend Micro PC-Cillin | =2003 | |
Trend Micro PortalProtect | =1.0 | |
Trend Micro ScanMail for IBM Domino | =2.6 | |
Trend Micro ScanMail for IBM Domino | =2.51 | |
Trend Micro ScanMail for IBM Domino | =3.8 | |
Trend Micro ScanMail for IBM Domino | =3.81 | |
Trend Micro ScanMail for IBM Domino | =6.1 | |
Trend Micro ScanMail for IBM Domino | =gold | |
Trend Micro ScanMail for IBM Domino | =gold | |
Trend Micro ScanMail for IBM Domino | =gold | |
Trend Micro ScanMail for IBM Domino | =gold | |
Trend Micro ScanMail for IBM Domino | =gold | |
Trend Micro ScanMail for IBM Domino | ||
Trend Micro ServerProtect for Windows | =1.3 | |
Trend Micro ServerProtect for Windows | =1.25_2007-02-16 | |
Trend Micro ServerProtect for Windows | =2.5 | |
Trend Micro ServerProtect for Windows | =5.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2005-0533 is high due to its potential for remote code execution.
To mitigate CVE-2005-0533, upgrade to a version of the Trend Micro products that is using the VSAPI library version 7.510 or later.
Affected Trend Micro products include Client-Server Messaging Suite SMB, Control Manager, InterScan eManager, and several others listed in the CVE details.
CVE-2005-0533 is associated with a heap-based buffer overflow attack that can occur via specially crafted ARJ files.
Yes, CVE-2005-0533 could potentially lead to data breaches as it allows remote attackers to execute arbitrary code.