Stack-based buffer overflow in PccScan.dll before build 1451 in Trend Micro AntiVirus plus AntiSpyware 2008, Internet Security 2008, and Internet Security Pro 2008 allows user-assisted remote attackers to cause a denial of service (SfCtlCom.exe crash), and allows local users to gain privileges, via a malformed .zip archive with a long name, as demonstrated by a .zip file created via format string specifiers in a crafted .uue file.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://esupport.trendmicro.com/support/viewxml.do?ContentID=1036464 - Patch | |
References | () http://osvdb.org/39769 - | |
References | () http://osvdb.org/39770 - | |
References | () http://secunia.com/advisories/28038 - Patch, Vendor Advisory | |
References | () http://secway.org/advisory/AD20071211.txt - | |
References | () http://www.securitytracker.com/id?1019079 - | |
References | () http://www.vupen.com/english/advisories/2007/4191 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/38982 - |
Information
Published : 2007-12-15 02:46
Updated : 2024-11-21 00:40
NVD link : CVE-2007-6386
Mitre link : CVE-2007-6386
CVE.ORG link : CVE-2007-6386
JSON object : View
Products Affected
trend_micro
- trend_micro_antivirus_plus_antispyware
- trend_micro_internet_security_pro
- trend_micro_internet_security__virus_bust
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer