First published: Tue Jan 30 2007(Updated: )
Buffer overflow in libvsapi.so in the VSAPI library in Trend Micro VirusWall 3.81 for Linux, as used by IScan.BASE/vscan, allows local users to gain privileges via a long command line argument, a different vulnerability than CVE-2005-0533.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Interscan VirusWall | =3.81 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0602 has a high severity rating due to its potential for local privilege escalation.
To mitigate CVE-2007-0602, update to the latest version of Trend Micro VirusWall, addressing the buffer overflow issue.
CVE-2007-0602 affects users running Trend Micro VirusWall version 3.81 on Linux.
CVE-2007-0602 is classified as a buffer overflow vulnerability.
CVE-2007-0602 requires local access for exploitation, making it a local privilege escalation vulnerability.