VID |
28115 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Trend Micro engine, according to its version, has a heap overflow vulnerability in the ARJ handling functions. Trend Micro products that use a Scan Engine version prior to VSAPI 7.510 are vulnerable to a heap-based buffer overflow, caused by improper bounds checking when handling ARJ archives. An attacker can exploit this vulnerability to execute arbitrary code on the affected host. This vulnerability can be triggered by an unauthenticated remote attacker, without user interaction, by sending an e-mail containing a crafted ARJ file to the target Trend Micro AntiVirus Library on client, server, and gateway implementations. Additional attack vectors exist over other common protocols (e.g. HTTP, FTP, POP3), but some may require user interaction.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.kb.cert.org/vuls/id/107822 http://xforce.iss.net/xforce/alerts/id/189 http://www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+VSAPI+ARJ+parsing+could+allow+Remote+Code+execution
* Platforms Affected: Trend Micro products that use a Scan Engine version prior to VSAPI 7.510 Microsoft Windows Any version |
Recommendation |
Upgrade your scan engine to VSAPI 7.510 or higher, available from the Trend Micro's 'Scan Engine Updates' Web site at http://www.trendmicro.com/download/engine.asp |
Related URL |
CVE-2005-0533 (CVE) |
Related URL |
12643 (SecurityFocus) |
Related URL |
19140 (ISS) |
|