Stack-Based Buffer Overflow in Trend Micro AntiSpyware and PC-Cillin Internet Security
CVE-2007-3873
Currently unrated
Key Information:
- Vendor
- Trend Micro
- Vendor
- CVE Published:
- 22 August 2007
Summary
This vulnerability resides in the vstlib32.dll component of Trend Micro AntiSpyware and PC-Cillin Internet Security, specifically affecting versions from 3.5 and 15.0 to 15.3 respectively, when the Venus Spy Trap feature is activated. A stack-based buffer overflow occurs due to handling overly long pathname arguments during the ReadDirectoryChangesW callback. This could allow local users to disrupt service operations or potentially execute arbitrary code, compromising system integrity and availability.
References
Timeline
Vulnerability published
Vulnerability Reserved