This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Trend Micro First view 2005-05-02
Product Interscan Messaging Security Suite Last view 2007-02-08
Version gold Type Application
Update *  
Edition linux  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:trend_micro:interscan_messaging_security_suite

Activity : Overall

Related : CVE

  Date Alert Description
9.3 2007-02-08 CVE-2007-0851

Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.

7.5 2005-05-02 CVE-2005-0533

Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

Open Source Vulnerability Database (OSVDB)

id Description
33038 Trend Micro Multiple Products UPX Handling Overflow
14133 Trend Micro Multiple Anti-Virus Products ARJ Archive Handling Overflow

Information Assurance Vulnerability Management (IAVM)

id Description
2007-A-0013 Trend Micro Antivirus UPX Compressed PE File Buffer Overflow Vulnerability
Severity: Category I - VMSKEY: V0013605

Snort® IPS/IDS

Date Description
2014-01-10 Trend Micro Products Antivirus Library overflow attempt
RuleID : 15992 - Type : FILE-OTHER - Revision : 7

Nessus® Vulnerability Scanner

id Description
2007-02-21 Name: The remote Windows host is vulnerable to a buffer overflow attack.
File: trendmicro_upx_parsing.nasl - Type: ACT_GATHER_INFO
2005-02-24 Name: The remote host is running an application that is affected by a buffer overfl...
File: trendmicro_arj_overflow.nasl - Type: ACT_GATHER_INFO