CVE-2008-1365
Trend Micro Officescan Corporate Edition - Memory Corruption
Title source: ruleDescription
Stack-based buffer overflow in Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long encrypted password, which triggers the overflow in (1) cgiChkMasterPwd.exe, (2) policyserver.exe as reachable through cgiABLogon.exe, and other vectors.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16768
exploitdb
WRITEUP
VERIFIED
by Luigi Auriemma · textdoswindows
https://www.exploit-db.com/exploits/31310
metasploit
WORKING POC
GOOD
by toto · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/trendmicro_officescan.rb
References (5)
Scores
EPSS
0.7521
EPSS Percentile
98.9%
Details
CWE
CWE-119
Status
published
Products (1)
trend_micro/officescan_corporate_edition
< 7.3_patch3_build1314
Published
Mar 17, 2008
Tracked Since
Feb 18, 2026