Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2007-0851 | First vendor Publication | 2007-02-08 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0851 |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
33038 | Trend Micro Multiple Products UPX Handling Overflow |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2007-02-16 | IAVM : 2007-A-0013 - Trend Micro Antivirus UPX Compressed PE File Buffer Overflow Vulnerability Severity : Category I - VMSKEY : V0013605 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-02-21 | Name : The remote Windows host is vulnerable to a buffer overflow attack. File : trendmicro_upx_parsing.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:18:15 |
|
2024-11-28 12:11:31 |
|
2021-05-04 12:05:22 |
|
2021-04-22 01:05:55 |
|
2020-05-23 00:19:16 |
|
2017-07-29 12:02:01 |
|
2016-06-28 16:11:20 |
|
2016-04-26 15:45:21 |
|
2014-02-17 10:39:04 |
|
2013-11-11 12:37:40 |
|
2013-05-11 10:19:11 |
|