Description
Stack-based buffer overflow in Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long encrypted password, which triggers the overflow in (1) cgiChkMasterPwd.exe, (2) policyserver.exe as reachable through cgiABLogon.exe, and other vectors.
CVSS Metrics
- Vector
- AV:N/AC:L/Au:N/C:N/I:P/A:P
- Access Vector
- network
- Access Cmplx
- low
- Auth
- none
- Confidentiality
- none
- Integrity
- partial
- Availability
- partial
- Weaknesses
- CWE-119
Metadata
- Primary Vendor
- TREND_MICRO
- Published
- 3/17/2008
- Last Modified
- 4/9/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
trend_micro : officescan_corporate_editiontrend_micro : officescan_corporate_edition
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.