First published: Wed Jan 21 2009(Updated: )
Multiple heap-based buffer overflows in the ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allow remote attackers to execute arbitrary code via a packet with a small value in an unspecified size field.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Internet Security | =17.0.1224 | |
Trend Micro Internet Security | ||
Trend Micro OfficeScan XG | =8.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3865 has a high severity rating due to the potential for remote code execution by attackers.
To fix CVE-2008-3865, you should apply the latest patches and updates provided by Trend Micro for your affected products.
CVE-2008-3865 affects Trend Micro OfficeScan 8.0 SP1 and Trend Micro Internet Security 2007 and 2008.
CVE-2008-3865 is classified as a heap-based buffer overflow vulnerability.
Yes, CVE-2008-3865 can be exploited remotely by attackers.