CWE
119 NVD-CWE-Other
Advisory Published
Updated

CVE-2007-0851: Buffer Overflow

First published: Thu Feb 08 2007(Updated: )

Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Trend Micro Client-Server Messaging Suite SMB=gold
Trend Micro Client-Server Messaging Suite SMB=gold
Trend Micro Control Manager=2.5.0
Trend Micro Control Manager=3.5
Trend Micro Control Manager=gold
Trend Micro Control Manager=gold
Trend Micro Control Manager=gold
Trend Micro Control Manager=gold
Trend Micro Control Manager=gold
Trend Micro Control Manager=netware
Trend Micro InterScan eManager=3.5
Trend Micro InterScan eManager=3.5.2
Trend Micro InterScan eManager=3.6
Trend Micro InterScan eManager=3.6
Trend Micro InterScan eManager=3.51
Trend Micro InterScan eManager=3.51_j
Trend Micro InterScan Messaging Security Suite
Trend Micro InterScan Messaging Security Suite=3.81
Trend Micro InterScan Messaging Security Suite=5.5
Trend Micro InterScan Messaging Security Suite=5.5_build_1183
Trend Micro InterScan Messaging Security Suite=gold
Trend Micro InterScan Messaging Security Suite=gold
Trend Micro InterScan Messaging Security Suite=gold
Trend Micro InterScan VirusWall Scan Engine=3.0.1
Trend Micro InterScan VirusWall Scan Engine=3.0.1
Trend Micro InterScan VirusWall Scan Engine=3.1.0
Trend Micro InterScan VirusWall Scan Engine=3.2.3
Trend Micro InterScan VirusWall Scan Engine=3.3
Trend Micro InterScan VirusWall Scan Engine=3.6
Trend Micro InterScan VirusWall Scan Engine=3.6
Trend Micro InterScan VirusWall Scan Engine=3.6
Trend Micro InterScan VirusWall Scan Engine=3.6
Trend Micro InterScan VirusWall Scan Engine=3.6.0_build_1182
Trend Micro InterScan VirusWall Scan Engine=3.6.0_build1166
Trend Micro InterScan VirusWall Scan Engine=3.6.5
Trend Micro InterScan VirusWall Scan Engine=3.7.0
Trend Micro InterScan VirusWall Scan Engine=3.7.0_build1190
Trend Micro InterScan VirusWall Scan Engine=3.8.0_build1130
Trend Micro InterScan VirusWall Scan Engine=3.32
Trend Micro InterScan VirusWall Scan Engine=3.81
Trend Micro InterScan VirusWall Scan Engine=5.1
Trend Micro InterScan VirusWall Scan Engine=gold
Trend Micro InterScan VirusWall Scan Engine=gold
Trend Micro InterScan VirusWall Scan Engine=gold
Trend Micro InterScan VirusWall Scan Engine=gold
Trend Micro InterScan VirusWall Scan Engine=gold
Trend Micro InterScan VirusWall Scan Engine=3.4
Trend Micro InterScan VirusWall Scan Engine=3.5
Trend Micro InterScan VirusWall Scan Engine=3.6
Trend Micro InterScan VirusWall Scan Engine=3.51
Trend Micro InterScan VirusWall Scan Engine=3.52
Trend Micro InterScan VirusWall Scan Engine=3.52_build1466
Trend Micro InterScan VirusWall Scan Engine=5.1.0
Trend Micro InterScan VirusWall Scan Engine=7.510.0-1002
Trend Micro Web Security Suite
Trend Micro Web Security Suite
Trend Micro Web Security Suite=gold
Trend Micro Web Security Suite=gold
Trend Micro Web Security Suite=gold
Trend Micro InterScan WebManager=1.2
Trend Micro InterScan WebManager=2.0
Trend Micro InterScan WebManager=2.1
Trend Micro Interscan Web Protect=gold
Trend Micro OfficeScan XG=3.0
Trend Micro OfficeScan XG=4.5.0
Trend Micro OfficeScan XG=7.3
Trend Micro OfficeScan XG=corporate_3.0
Trend Micro OfficeScan XG=corporate_3.1.1
Trend Micro OfficeScan XG=corporate_3.5
Trend Micro OfficeScan XG=corporate_3.5
Trend Micro OfficeScan XG=corporate_3.11
Trend Micro OfficeScan XG=corporate_3.11
Trend Micro OfficeScan XG=corporate_3.13
Trend Micro OfficeScan XG=corporate_3.13
Trend Micro OfficeScan XG=corporate_3.54
Trend Micro OfficeScan XG=corporate_5.02
Trend Micro OfficeScan XG=corporate_5.5
Trend Micro OfficeScan XG=corporate_5.58
Trend Micro OfficeScan XG=corporate_6.5
Trend Micro OfficeScan XG=corporate_7.0
Trend Micro OfficeScan XG=corporate_7.3
Trend Micro PC-Cillin=6.0
Trend Micro PC-Cillin=2000
Trend Micro PC-Cillin=2002
Trend Micro PC-Cillin=2003
Trend Micro PC-Cillin=2005
Trend Micro PC-Cillin=2006
Trend Micro PC-Cillin=14_14.00.1485
Trend Micro PC-Cillin=2005_12.0.0_0_build_1244
Trend Micro PC-Cillin=2006_14.10.0.1023
Trend Micro PC-Cillin=2007
Trend Micro PC Cillin - Internet Security 2006
Trend Micro PortalProtect=1.0
Trend Micro PortalProtect=1.2
Trend Micro ScanMail for IBM Domino=1.0.0
Trend Micro ScanMail for IBM Domino=2.6
Trend Micro ScanMail for IBM Domino=2.51
Trend Micro ScanMail for IBM Domino=3.8
Trend Micro ScanMail for IBM Domino=3.81
Trend Micro ScanMail for IBM Domino=6.1
Trend Micro ScanMail for IBM Domino=gold
Trend Micro ScanMail for IBM Domino=gold
Trend Micro ScanMail for IBM Domino=gold
Trend Micro ScanMail for IBM Domino=gold
Trend Micro ScanMail for IBM Domino=gold
Trend Micro ScanMail for IBM Domino
Trend Micro Scan Engine=7.1.0
Trend Micro ServerProtect for Windows=5.3.1
Trend Micro ServerProtect for Windows=5.5.8
Trend Micro ServerProtect for Windows=5.58
Trend Micro ServerProtect for Windows=5.58
Trend Micro ServerProtect for Windows=linux
Trend Micro ServerProtect for Windows=linux_1.2.0
Trend Micro ServerProtect for Windows=novell_netware
Trend Micro ServerProtect for Windows=windows
Trend Micro VirusWall=3.0.1
Trend Micro InterScan Web Security Suite=1.2.0
Trend Micro Interscan Web Protect=3.1.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2007-0851?

    CVE-2007-0851 is classified with high severity due to the potential for remote code execution.

  • How do I fix CVE-2007-0851?

    To fix CVE-2007-0851, update the Trend Micro Scan Engine to version 8.300 with the latest virus pattern file.

  • Which versions are affected by CVE-2007-0851?

    CVE-2007-0851 affects Trend Micro Scan Engine 8.000 and 8.300 prior to virus pattern file 4.245.00.

  • What is the exploit vector for CVE-2007-0851?

    CVE-2007-0851 can be exploited through a malformed UPX compressed executable sent by remote attackers.

  • Are there any known exploitation examples of CVE-2007-0851?

    Yes, CVE-2007-0851 has been documented in various vulnerability reports indicating potential exploitation in real-world scenarios.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203