Trend Micro VSAPI ARJ Handling Heap Overflow
High Nessus Plugin ID 17213
SynopsisThe remote host is running an application that is affected by a buffer overflow vulnerability.
DescriptionThe remote host is running a version of the Trend Micro engine that has a heap overflow vulnerability in the ARJ handling functions.
An attacker may exploit this flaw to bypass virus protection altogether and execute arbitrary code on the remote host. To exploit this flaw, an attacker would need to submit a malformed ARJ archive to a process on the remote host and wait for the antivirus engine to scan it.
SolutionUpgrade to the Trend Micro engine version 7.510 or newer.