CVE-2008-3865

critical

Description

Multiple heap-based buffer overflows in the ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allow remote attackers to execute arbitrary code via a packet with a small value in an unspecified size field.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/48107

http://www.vupen.com/english/advisories/2009/0191

http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3191_Readme.txt

http://www.securitytracker.com/id?1021615

http://www.securitytracker.com/id?1021614

http://www.securityfocus.com/bid/33358

http://www.securityfocus.com/archive/1/500195/100/0/threaded

http://securityreason.com/securityalert/4937

http://secunia.com/secunia_research/2008-42/

http://secunia.com/advisories/33609

http://secunia.com/advisories/31160

Details

Source: Mitre, NVD

Published: 2009-01-21

Updated: 2018-10-11

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical