CVE-2005-0533

Summary

CVECVE-2005-0533
StatePUBLISHED
Assignermitre
Source PriorityCVE Program / NVD first with legacy fallback
Published2005-05-02 04:00:00 UTC
Updated2025-04-03 01:03:51 UTC
DescriptionHeap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.

Risk And Classification

Primary CVSS: v2.0 7.5 from [email protected]

AV:N/AC:L/Au:N/C:P/I:P/A:P

Problem Types: NVD-CWE-Other | n/a

CVSS v2.0 Breakdown

Access Vector
Network
Access Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial

AV:N/AC:L/Au:N/C:P/I:P/A:P

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Trend Micro Client-server-messaging Suite Smb gold All windows All
Application Trend Micro Client-server Suite Smb gold All windows All
Application Trend Micro Control Manager gold All as_400 All
Application Trend Micro Control Manager gold All solaris All
Application Trend Micro Control Manager gold All s_390 All
Application Trend Micro Control Manager gold All windows All
Application Trend Micro Control Manager gold All windows_nt All
Application Trend Micro Control Manager netware All All All
Application Trend Micro Interscan Emanager 3.5 All hp All
Application Trend Micro Interscan Emanager 3.5.2 All windows All
Application Trend Micro Interscan Emanager 3.51 All All All
Application Trend Micro Interscan Emanager 3.51_j All All All
Application Trend Micro Interscan Emanager 3.6 All linux All
Application Trend Micro Interscan Emanager 3.6 All sun All
Application Trend Micro Interscan Messaging Security Suite 3.81 All All All
Application Trend Micro Interscan Messaging Security Suite 5.5 All All All
Application Trend Micro Interscan Messaging Security Suite gold All linux All
Application Trend Micro Interscan Messaging Security Suite gold All solaris All
Application Trend Micro Interscan Messaging Security Suite gold All windows All
Application Trend Micro Interscan Viruswall 3.0.1 All linux All
Application Trend Micro Interscan Viruswall 3.0.1 All unix All
Application Trend Micro Interscan Viruswall 3.4 All windows_nt All
Application Trend Micro Interscan Viruswall 3.5 All windows_nt All
Application Trend Micro Interscan Viruswall 3.51 All windows_nt All
Application Trend Micro Interscan Viruswall 3.52 All windows_nt All
Application Trend Micro Interscan Viruswall 3.52_build1466 All windows_nt All
Application Trend Micro Interscan Viruswall 3.6 All hp_ux All
Application Trend Micro Interscan Viruswall 3.6 All solaris All
Application Trend Micro Interscan Viruswall 3.6 All unix All
Application Trend Micro Interscan Viruswall 3.6 All windows_nt All
Application Trend Micro Interscan Viruswall 3.6.5 All linux All
Application Trend Micro Interscan Viruswall 5.1 All windows_nt All
Application Trend Micro Interscan Viruswall gold All aix All
Application Trend Micro Interscan Viruswall gold All linux_for_smb All
Application Trend Micro Interscan Viruswall gold All smb All
Application Trend Micro Interscan Viruswall gold All windows All
Application Trend Micro Interscan Viruswall gold All windows_nt_for_smb All
Application Trend Micro Interscan Webmanager 1.2 All All All
Application Trend Micro Interscan Webmanager 2.0 All All All
Application Trend Micro Interscan Webmanager 2.1 All All All
Application Trend Micro Interscan Webprotect gold All isa All
Application Trend Micro Interscan Web Security Suite gold All linux All
Application Trend Micro Interscan Web Security Suite gold All solaris All
Application Trend Micro Interscan Web Security Suite gold All windows All
Application Trend Micro Officescan 3.0 All corporate All
Application Trend Micro Officescan corporate_3.0 All windows_nt_server All
Application Trend Micro Officescan corporate_3.1.1 All windows_nt_server All
Application Trend Micro Officescan corporate_3.11 All All All
Application Trend Micro Officescan corporate_3.11 All windows_nt_server All
Application Trend Micro Officescan corporate_3.13 All All All
Application Trend Micro Officescan corporate_3.13 All windows_nt_server All
Application Trend Micro Officescan corporate_3.5 All All All
Application Trend Micro Officescan corporate_3.5 All windows_nt_server All
Application Trend Micro Officescan corporate_3.54 All All All
Application Trend Micro Officescan corporate_5.02 All All All
Application Trend Micro Officescan corporate_5.5 All All All
Application Trend Micro Officescan corporate_5.58 All All All
Application Trend Micro Officescan corporate_6.5 All All All
Application Trend Micro Pc-cillin 2000 All All All
Application Trend Micro Pc-cillin 2002 All All All
Application Trend Micro Pc-cillin 2003 All All All
Application Trend Micro Pc-cillin 6.0 All All All
Application Trend Micro Portalprotect 1.0 All All All
Application Trend Micro Scanmail 2.51 All domino All
Application Trend Micro Scanmail 2.6 All domino All
Application Trend Micro Scanmail 3.8 All microsoft_exchange All
Application Trend Micro Scanmail 3.81 All microsoft_exchange All
Application Trend Micro Scanmail 6.1 All microsoft_exchange All
Application Trend Micro Scanmail gold All lotus_domino_on_aix All
Application Trend Micro Scanmail gold All lotus_domino_on_as_400 All
Application Trend Micro Scanmail gold All lotus_domino_on_solaris All
Application Trend Micro Scanmail gold All lotus_domino_on_s_390 All
Application Trend Micro Scanmail gold All lotus_domino_on_windows All
Application Trend Micro Scanmail Emanager All All All All
Application Trend Micro Serverprotect 1.25_2007-02-16 All linux All
Application Trend Micro Serverprotect 1.3 All linux All
Application Trend Micro Serverprotect 2.5 All linux All
Application Trend Micro Serverprotect 5.3.1 All All All

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Na N/a affected n/a Not specified

References

ReferenceSourceLinkTags
xforce.iss.net/xforce/alerts/id/189 af854a3a-2127-422b-91ae-364da2661108 xforce.iss.net Vendor Advisory
SecurityTracker.com Archives - TrendMicro PC-cillin Buffer Overflow in ARJ Parser Lets Remote Users Execute Arbitrary Code af854a3a-2127-422b-91ae-364da2661108 securitytracker.com Patch, Vendor Advisory
Vulnerability in VSAPI ARJ parsing could allow Remote Code execution af854a3a-2127-422b-91ae-364da2661108 www.trendmicro.com Patch
SecurityTracker.com Archives - TrendMicro OfficeScan Buffer Overflow in ARJ Parser Lets Remote Users Execute Arbitrary Code af854a3a-2127-422b-91ae-364da2661108 securitytracker.com Patch, Vendor Advisory
Secunia - Advisories - Trend Micro Products AntiVirus Library Buffer Overflow af854a3a-2127-422b-91ae-364da2661108 secunia.com Patch, Vendor Advisory
Trend Micro VSAPI ARJ Handling Heap Overflow Vulnerability af854a3a-2127-422b-91ae-364da2661108 www.securityfocus.com Patch
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report