Multiple heap-based buffer overflows in the ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allow remote attackers to execute arbitrary code via a packet with a small value in an unspecified size field.
https://exchange.xforce.ibmcloud.com/vulnerabilities/48107
http://www.vupen.com/english/advisories/2009/0191
http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3191_Readme.txt
http://www.securitytracker.com/id?1021615
http://www.securitytracker.com/id?1021614
http://www.securityfocus.com/bid/33358
http://www.securityfocus.com/archive/1/500195/100/0/threaded
http://securityreason.com/securityalert/4937
http://secunia.com/secunia_research/2008-42/