Vulnerability Details CVE-2005-0533
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.07
EPSS Ranking 90.9%
CVSS Severity
CVSS v2 Score 7.5
Products affected by CVE-2005-0533
-
cpe:2.3:a:trend_micro:client-server-messaging_suite_smb:gold
-
cpe:2.3:a:trend_micro:client-server_suite_smb:gold
-
cpe:2.3:a:trend_micro:control_manager:gold
-
cpe:2.3:a:trend_micro:control_manager:netware
-
cpe:2.3:a:trend_micro:interscan_emanager:3.5
-
cpe:2.3:a:trend_micro:interscan_emanager:3.5.2
-
cpe:2.3:a:trend_micro:interscan_emanager:3.51
-
cpe:2.3:a:trend_micro:interscan_emanager:3.51_j
-
cpe:2.3:a:trend_micro:interscan_emanager:3.6
-
cpe:2.3:a:trend_micro:interscan_messaging_security_suite:3.81
-
cpe:2.3:a:trend_micro:interscan_messaging_security_suite:5.5
-
cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold
-
cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1
-
cpe:2.3:a:trend_micro:interscan_viruswall:3.4
-
cpe:2.3:a:trend_micro:interscan_viruswall:3.5
-
cpe:2.3:a:trend_micro:interscan_viruswall:3.51
-
cpe:2.3:a:trend_micro:interscan_viruswall:3.52
-
cpe:2.3:a:trend_micro:interscan_viruswall:3.52_build1466
-
cpe:2.3:a:trend_micro:interscan_viruswall:3.6
-
cpe:2.3:a:trend_micro:interscan_viruswall:3.6.5
-
cpe:2.3:a:trend_micro:interscan_viruswall:5.1
-
cpe:2.3:a:trend_micro:interscan_viruswall:gold
-
cpe:2.3:a:trend_micro:interscan_web_security_suite:gold
-
cpe:2.3:a:trend_micro:interscan_webmanager:1.2
-
cpe:2.3:a:trend_micro:interscan_webmanager:2.0
-
cpe:2.3:a:trend_micro:interscan_webmanager:2.1
-
cpe:2.3:a:trend_micro:interscan_webprotect:gold
-
cpe:2.3:a:trend_micro:officescan:3.0
-
cpe:2.3:a:trend_micro:officescan:corporate_3.0
-
cpe:2.3:a:trend_micro:officescan:corporate_3.1.1
-
cpe:2.3:a:trend_micro:officescan:corporate_3.11
-
cpe:2.3:a:trend_micro:officescan:corporate_3.13
-
cpe:2.3:a:trend_micro:officescan:corporate_3.5
-
cpe:2.3:a:trend_micro:officescan:corporate_3.54
-
cpe:2.3:a:trend_micro:officescan:corporate_5.02
-
cpe:2.3:a:trend_micro:officescan:corporate_5.5
-
cpe:2.3:a:trend_micro:officescan:corporate_5.58
-
cpe:2.3:a:trend_micro:officescan:corporate_6.5
-
cpe:2.3:a:trend_micro:pc-cillin:2000
-
cpe:2.3:a:trend_micro:pc-cillin:2002
-
cpe:2.3:a:trend_micro:pc-cillin:2003
-
cpe:2.3:a:trend_micro:pc-cillin:6.0
-
cpe:2.3:a:trend_micro:portalprotect:1.0
-
cpe:2.3:a:trend_micro:scanmail:2.51
-
cpe:2.3:a:trend_micro:scanmail:2.6
-
cpe:2.3:a:trend_micro:scanmail:3.8
-
cpe:2.3:a:trend_micro:scanmail:3.81
-
cpe:2.3:a:trend_micro:scanmail:6.1
-
cpe:2.3:a:trend_micro:scanmail:gold
-
cpe:2.3:a:trend_micro:scanmail_emanager:*
-
cpe:2.3:a:trend_micro:serverprotect:1.25_2007-02-16
-
cpe:2.3:a:trend_micro:serverprotect:1.3
-
cpe:2.3:a:trend_micro:serverprotect:2.5
-
cpe:2.3:a:trend_micro:serverprotect:5.3.1