CVE-2005-0533 (CNNVD-200505-443)

HIGH
中文标题:
Trend Micro VSAPI ARJ文件处理堆溢出漏洞
英文标题:
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple ...
CVSS分数: 7.5
发布时间: 2005-02-24 05:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Trend Micro AntiVirus Library VSAPI 7.510之前的版本,当在多个Trend Micro产品中使用时,其包含的堆缓冲区溢出漏洞允许远程攻击者通过精心构建、带有较长头文件名且可以修改结构指针的ARJ文件来执行任意代码。

英文描述:

Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
trend_micro client-server-messaging_suite_smb gold - - cpe:2.3:a:trend_micro:client-server-messaging_suite_smb:gold:*:windows:*:*:*:*:*
trend_micro client-server_suite_smb gold - - cpe:2.3:a:trend_micro:client-server_suite_smb:gold:*:windows:*:*:*:*:*
trend_micro control_manager gold - - cpe:2.3:a:trend_micro:control_manager:gold:*:as_400:*:*:*:*:*
trend_micro control_manager netware - - cpe:2.3:a:trend_micro:control_manager:netware:*:*:*:*:*:*:*
trend_micro interscan_emanager 3.5 - - cpe:2.3:a:trend_micro:interscan_emanager:3.5:*:hp:*:*:*:*:*
trend_micro interscan_emanager 3.5.2 - - cpe:2.3:a:trend_micro:interscan_emanager:3.5.2:*:windows:*:*:*:*:*
trend_micro interscan_emanager 3.6 - - cpe:2.3:a:trend_micro:interscan_emanager:3.6:*:linux:*:*:*:*:*
trend_micro interscan_emanager 3.51 - - cpe:2.3:a:trend_micro:interscan_emanager:3.51:*:*:*:*:*:*:*
trend_micro interscan_emanager 3.51_j - - cpe:2.3:a:trend_micro:interscan_emanager:3.51_j:*:*:*:*:*:*:*
trend_micro interscan_messaging_security_suite 3.81 - - cpe:2.3:a:trend_micro:interscan_messaging_security_suite:3.81:*:*:*:*:*:*:*
trend_micro interscan_messaging_security_suite 5.5 - - cpe:2.3:a:trend_micro:interscan_messaging_security_suite:5.5:*:*:*:*:*:*:*
trend_micro interscan_messaging_security_suite gold - - cpe:2.3:a:trend_micro:interscan_messaging_security_suite:gold:*:linux:*:*:*:*:*
trend_micro interscan_viruswall 3.0.1 - - cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:*:linux:*:*:*:*:*
trend_micro interscan_viruswall 3.4 - - cpe:2.3:a:trend_micro:interscan_viruswall:3.4:*:windows_nt:*:*:*:*:*
trend_micro interscan_viruswall 3.5 - - cpe:2.3:a:trend_micro:interscan_viruswall:3.5:*:windows_nt:*:*:*:*:*
trend_micro interscan_viruswall 3.6 - - cpe:2.3:a:trend_micro:interscan_viruswall:3.6:*:hp_ux:*:*:*:*:*
trend_micro interscan_viruswall 3.6.5 - - cpe:2.3:a:trend_micro:interscan_viruswall:3.6.5:*:linux:*:*:*:*:*
trend_micro interscan_viruswall 3.51 - - cpe:2.3:a:trend_micro:interscan_viruswall:3.51:*:windows_nt:*:*:*:*:*
trend_micro interscan_viruswall 3.52 - - cpe:2.3:a:trend_micro:interscan_viruswall:3.52:*:windows_nt:*:*:*:*:*
trend_micro interscan_viruswall 3.52_build1466 - - cpe:2.3:a:trend_micro:interscan_viruswall:3.52_build1466:*:windows_nt:*:*:*:*:*
trend_micro interscan_viruswall 5.1 - - cpe:2.3:a:trend_micro:interscan_viruswall:5.1:*:windows_nt:*:*:*:*:*
trend_micro interscan_viruswall gold - - cpe:2.3:a:trend_micro:interscan_viruswall:gold:*:aix:*:*:*:*:*
trend_micro interscan_web_security_suite gold - - cpe:2.3:a:trend_micro:interscan_web_security_suite:gold:*:linux:*:*:*:*:*
trend_micro interscan_webmanager 1.2 - - cpe:2.3:a:trend_micro:interscan_webmanager:1.2:*:*:*:*:*:*:*
trend_micro interscan_webmanager 2.0 - - cpe:2.3:a:trend_micro:interscan_webmanager:2.0:*:*:*:*:*:*:*
trend_micro interscan_webmanager 2.1 - - cpe:2.3:a:trend_micro:interscan_webmanager:2.1:*:*:*:*:*:*:*
trend_micro interscan_webprotect gold - - cpe:2.3:a:trend_micro:interscan_webprotect:gold:*:isa:*:*:*:*:*
trend_micro officescan 3.0 - - cpe:2.3:a:trend_micro:officescan:3.0:*:corporate:*:*:*:*:*
trend_micro officescan corporate_3.0 - - cpe:2.3:a:trend_micro:officescan:corporate_3.0:*:windows_nt_server:*:*:*:*:*
trend_micro officescan corporate_3.1.1 - - cpe:2.3:a:trend_micro:officescan:corporate_3.1.1:*:windows_nt_server:*:*:*:*:*
trend_micro officescan corporate_3.5 - - cpe:2.3:a:trend_micro:officescan:corporate_3.5:*:*:*:*:*:*:*
trend_micro officescan corporate_3.11 - - cpe:2.3:a:trend_micro:officescan:corporate_3.11:*:*:*:*:*:*:*
trend_micro officescan corporate_3.13 - - cpe:2.3:a:trend_micro:officescan:corporate_3.13:*:*:*:*:*:*:*
trend_micro officescan corporate_3.54 - - cpe:2.3:a:trend_micro:officescan:corporate_3.54:*:*:*:*:*:*:*
trend_micro officescan corporate_5.02 - - cpe:2.3:a:trend_micro:officescan:corporate_5.02:*:*:*:*:*:*:*
trend_micro officescan corporate_5.5 - - cpe:2.3:a:trend_micro:officescan:corporate_5.5:*:*:*:*:*:*:*
trend_micro officescan corporate_5.58 - - cpe:2.3:a:trend_micro:officescan:corporate_5.58:*:*:*:*:*:*:*
trend_micro officescan corporate_6.5 - - cpe:2.3:a:trend_micro:officescan:corporate_6.5:*:*:*:*:*:*:*
trend_micro pc-cillin 6.0 - - cpe:2.3:a:trend_micro:pc-cillin:6.0:*:*:*:*:*:*:*
trend_micro pc-cillin 2000 - - cpe:2.3:a:trend_micro:pc-cillin:2000:*:*:*:*:*:*:*
trend_micro pc-cillin 2002 - - cpe:2.3:a:trend_micro:pc-cillin:2002:*:*:*:*:*:*:*
trend_micro pc-cillin 2003 - - cpe:2.3:a:trend_micro:pc-cillin:2003:*:*:*:*:*:*:*
trend_micro portalprotect 1.0 - - cpe:2.3:a:trend_micro:portalprotect:1.0:*:*:*:*:*:*:*
trend_micro scanmail 2.6 - - cpe:2.3:a:trend_micro:scanmail:2.6:*:domino:*:*:*:*:*
trend_micro scanmail 2.51 - - cpe:2.3:a:trend_micro:scanmail:2.51:*:domino:*:*:*:*:*
trend_micro scanmail 3.8 - - cpe:2.3:a:trend_micro:scanmail:3.8:*:microsoft_exchange:*:*:*:*:*
trend_micro scanmail 3.81 - - cpe:2.3:a:trend_micro:scanmail:3.81:*:microsoft_exchange:*:*:*:*:*
trend_micro scanmail 6.1 - - cpe:2.3:a:trend_micro:scanmail:6.1:*:microsoft_exchange:*:*:*:*:*
trend_micro scanmail gold - - cpe:2.3:a:trend_micro:scanmail:gold:*:lotus_domino_on_aix:*:*:*:*:*
trend_micro scanmail_emanager * - - cpe:2.3:a:trend_micro:scanmail_emanager:*:*:*:*:*:*:*:*
trend_micro serverprotect 1.3 - - cpe:2.3:a:trend_micro:serverprotect:1.3:*:linux:*:*:*:*:*
trend_micro serverprotect 1.25_2007-02-16 - - cpe:2.3:a:trend_micro:serverprotect:1.25_2007-02-16:*:linux:*:*:*:*:*
trend_micro serverprotect 2.5 - - cpe:2.3:a:trend_micro:serverprotect:2.5:*:linux:*:*:*:*:*
trend_micro serverprotect 5.3.1 - - cpe:2.3:a:trend_micro:serverprotect:5.3.1:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_CONFIRM
cve.org
访问
1013290 vdb-entry
cve.org
访问
1013289 vdb-entry
cve.org
访问
20050224 Trend Micro AntiVirus Library Heap Overflow third-party-advisory
cve.org
访问
14396 third-party-advisory
cve.org
访问
12643 vdb-entry
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2005-02-24 05:00:00
修改时间:
2024-08-07 21:13:54
创建时间:
2025-11-11 15:32:25
更新时间:
2025-11-11 15:48:58
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2005-0533 2025-11-11 15:17:32 2025-11-11 07:32:25
NVD nvd_CVE-2005-0533 2025-11-11 14:51:18 2025-11-11 07:41:11
CNNVD cnnvd_CNNVD-200505-443 2025-11-11 15:08:46 2025-11-11 07:48:58
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:48:58
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200505-443; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200505-443
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:11
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 54; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 54
  • data_sources: ['cve'] -> ['cve', 'nvd']