CVE-2005-0533 (CNNVD-200505-443)
HIGH
中文标题:
Trend Micro VSAPI ARJ文件处理堆溢出漏洞
英文标题:
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple ...
CVSS分数:
7.5
发布时间:
2005-02-24 05:00:00
漏洞类型:
授权问题
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
Trend Micro AntiVirus Library VSAPI 7.510之前的版本,当在多个Trend Micro产品中使用时,其包含的堆缓冲区溢出漏洞允许远程攻击者通过精心构建、带有较长头文件名且可以修改结构指针的ARJ文件来执行任意代码。
英文描述:
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| trend_micro | client-server-messaging_suite_smb | gold | - | - |
cpe:2.3:a:trend_micro:client-server-messaging_suite_smb:gold:*:windows:*:*:*:*:*
|
| trend_micro | client-server_suite_smb | gold | - | - |
cpe:2.3:a:trend_micro:client-server_suite_smb:gold:*:windows:*:*:*:*:*
|
| trend_micro | control_manager | gold | - | - |
cpe:2.3:a:trend_micro:control_manager:gold:*:as_400:*:*:*:*:*
|
| trend_micro | control_manager | netware | - | - |
cpe:2.3:a:trend_micro:control_manager:netware:*:*:*:*:*:*:*
|
| trend_micro | interscan_emanager | 3.5 | - | - |
cpe:2.3:a:trend_micro:interscan_emanager:3.5:*:hp:*:*:*:*:*
|
| trend_micro | interscan_emanager | 3.5.2 | - | - |
cpe:2.3:a:trend_micro:interscan_emanager:3.5.2:*:windows:*:*:*:*:*
|
| trend_micro | interscan_emanager | 3.6 | - | - |
cpe:2.3:a:trend_micro:interscan_emanager:3.6:*:linux:*:*:*:*:*
|
| trend_micro | interscan_emanager | 3.51 | - | - |
cpe:2.3:a:trend_micro:interscan_emanager:3.51:*:*:*:*:*:*:*
|
| trend_micro | interscan_emanager | 3.51_j | - | - |
cpe:2.3:a:trend_micro:interscan_emanager:3.51_j:*:*:*:*:*:*:*
|
| trend_micro | interscan_messaging_security_suite | 3.81 | - | - |
cpe:2.3:a:trend_micro:interscan_messaging_security_suite:3.81:*:*:*:*:*:*:*
|
| trend_micro | interscan_messaging_security_suite | 5.5 | - | - |
cpe:2.3:a:trend_micro:interscan_messaging_security_suite:5.5:*:*:*:*:*:*:*
|
| trend_micro | interscan_messaging_security_suite | gold | - | - |
cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:*:linux:*:*:*:*:*
|
| trend_micro | interscan_viruswall | 3.0.1 | - | - |
cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:*:linux:*:*:*:*:*
|
| trend_micro | interscan_viruswall | 3.4 | - | - |
cpe:2.3:a:trend_micro:interscan_viruswall:3.4:*:windows_nt:*:*:*:*:*
|
| trend_micro | interscan_viruswall | 3.5 | - | - |
cpe:2.3:a:trend_micro:interscan_viruswall:3.5:*:windows_nt:*:*:*:*:*
|
| trend_micro | interscan_viruswall | 3.6 | - | - |
cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:hp_ux:*:*:*:*:*
|
| trend_micro | interscan_viruswall | 3.6.5 | - | - |
cpe:2.3:a:trend_micro:interscan_viruswall:3.6.5:*:linux:*:*:*:*:*
|
| trend_micro | interscan_viruswall | 3.51 | - | - |
cpe:2.3:a:trend_micro:interscan_viruswall:3.51:*:windows_nt:*:*:*:*:*
|
| trend_micro | interscan_viruswall | 3.52 | - | - |
cpe:2.3:a:trend_micro:interscan_viruswall:3.52:*:windows_nt:*:*:*:*:*
|
| trend_micro | interscan_viruswall | 3.52_build1466 | - | - |
cpe:2.3:a:trend_micro:interscan_viruswall:3.52_build1466:*:windows_nt:*:*:*:*:*
|
| trend_micro | interscan_viruswall | 5.1 | - | - |
cpe:2.3:a:trend_micro:interscan_viruswall:5.1:*:windows_nt:*:*:*:*:*
|
| trend_micro | interscan_viruswall | gold | - | - |
cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:aix:*:*:*:*:*
|
| trend_micro | interscan_web_security_suite | gold | - | - |
cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:*:linux:*:*:*:*:*
|
| trend_micro | interscan_webmanager | 1.2 | - | - |
cpe:2.3:a:trend_micro:interscan_webmanager:1.2:*:*:*:*:*:*:*
|
| trend_micro | interscan_webmanager | 2.0 | - | - |
cpe:2.3:a:trend_micro:interscan_webmanager:2.0:*:*:*:*:*:*:*
|
| trend_micro | interscan_webmanager | 2.1 | - | - |
cpe:2.3:a:trend_micro:interscan_webmanager:2.1:*:*:*:*:*:*:*
|
| trend_micro | interscan_webprotect | gold | - | - |
cpe:2.3:a:trend_micro:interscan_webprotect:gold:*:isa:*:*:*:*:*
|
| trend_micro | officescan | 3.0 | - | - |
cpe:2.3:a:trend_micro:officescan:3.0:*:corporate:*:*:*:*:*
|
| trend_micro | officescan | corporate_3.0 | - | - |
cpe:2.3:a:trend_micro:officescan:corporate_3.0:*:windows_nt_server:*:*:*:*:*
|
| trend_micro | officescan | corporate_3.1.1 | - | - |
cpe:2.3:a:trend_micro:officescan:corporate_3.1.1:*:windows_nt_server:*:*:*:*:*
|
| trend_micro | officescan | corporate_3.5 | - | - |
cpe:2.3:a:trend_micro:officescan:corporate_3.5:*:*:*:*:*:*:*
|
| trend_micro | officescan | corporate_3.11 | - | - |
cpe:2.3:a:trend_micro:officescan:corporate_3.11:*:*:*:*:*:*:*
|
| trend_micro | officescan | corporate_3.13 | - | - |
cpe:2.3:a:trend_micro:officescan:corporate_3.13:*:*:*:*:*:*:*
|
| trend_micro | officescan | corporate_3.54 | - | - |
cpe:2.3:a:trend_micro:officescan:corporate_3.54:*:*:*:*:*:*:*
|
| trend_micro | officescan | corporate_5.02 | - | - |
cpe:2.3:a:trend_micro:officescan:corporate_5.02:*:*:*:*:*:*:*
|
| trend_micro | officescan | corporate_5.5 | - | - |
cpe:2.3:a:trend_micro:officescan:corporate_5.5:*:*:*:*:*:*:*
|
| trend_micro | officescan | corporate_5.58 | - | - |
cpe:2.3:a:trend_micro:officescan:corporate_5.58:*:*:*:*:*:*:*
|
| trend_micro | officescan | corporate_6.5 | - | - |
cpe:2.3:a:trend_micro:officescan:corporate_6.5:*:*:*:*:*:*:*
|
| trend_micro | pc-cillin | 6.0 | - | - |
cpe:2.3:a:trend_micro:pc-cillin:6.0:*:*:*:*:*:*:*
|
| trend_micro | pc-cillin | 2000 | - | - |
cpe:2.3:a:trend_micro:pc-cillin:2000:*:*:*:*:*:*:*
|
| trend_micro | pc-cillin | 2002 | - | - |
cpe:2.3:a:trend_micro:pc-cillin:2002:*:*:*:*:*:*:*
|
| trend_micro | pc-cillin | 2003 | - | - |
cpe:2.3:a:trend_micro:pc-cillin:2003:*:*:*:*:*:*:*
|
| trend_micro | portalprotect | 1.0 | - | - |
cpe:2.3:a:trend_micro:portalprotect:1.0:*:*:*:*:*:*:*
|
| trend_micro | scanmail | 2.6 | - | - |
cpe:2.3:a:trend_micro:scanmail:2.6:*:domino:*:*:*:*:*
|
| trend_micro | scanmail | 2.51 | - | - |
cpe:2.3:a:trend_micro:scanmail:2.51:*:domino:*:*:*:*:*
|
| trend_micro | scanmail | 3.8 | - | - |
cpe:2.3:a:trend_micro:scanmail:3.8:*:microsoft_exchange:*:*:*:*:*
|
| trend_micro | scanmail | 3.81 | - | - |
cpe:2.3:a:trend_micro:scanmail:3.81:*:microsoft_exchange:*:*:*:*:*
|
| trend_micro | scanmail | 6.1 | - | - |
cpe:2.3:a:trend_micro:scanmail:6.1:*:microsoft_exchange:*:*:*:*:*
|
| trend_micro | scanmail | gold | - | - |
cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_aix:*:*:*:*:*
|
| trend_micro | scanmail_emanager | * | - | - |
cpe:2.3:a:trend_micro:scanmail_emanager:*:*:*:*:*:*:*:*
|
| trend_micro | serverprotect | 1.3 | - | - |
cpe:2.3:a:trend_micro:serverprotect:1.3:*:linux:*:*:*:*:*
|
| trend_micro | serverprotect | 1.25_2007-02-16 | - | - |
cpe:2.3:a:trend_micro:serverprotect:1.25_2007-02-16:*:linux:*:*:*:*:*
|
| trend_micro | serverprotect | 2.5 | - | - |
cpe:2.3:a:trend_micro:serverprotect:2.5:*:linux:*:*:*:*:*
|
| trend_micro | serverprotect | 5.3.1 | - | - |
cpe:2.3:a:trend_micro:serverprotect:5.3.1:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
CVSS评分详情
7.5
HIGH
CVSS向量:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本:
2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2005-02-24 05:00:00
修改时间:
2024-08-07 21:13:54
创建时间:
2025-11-11 15:32:25
更新时间:
2025-11-11 15:48:58
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2005-0533 |
2025-11-11 15:17:32 | 2025-11-11 07:32:25 |
| NVD | nvd_CVE-2005-0533 |
2025-11-11 14:51:18 | 2025-11-11 07:41:11 |
| CNNVD | cnnvd_CNNVD-200505-443 |
2025-11-11 15:08:46 | 2025-11-11 07:48:58 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:48:58
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200505-443; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200505-443
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:11
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 54; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 54
- data_sources: ['cve'] -> ['cve', 'nvd']