CVE-2008-1365

Trend Micro Officescan Corporate Edition - Memory Corruption

Title source: rule

Description

Stack-based buffer overflow in Trend Micro OfficeScan Corporate Edition 8.0 Patch 2 build 1189 and earlier, and 7.3 Patch 3 build 1314 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a long encrypted password, which triggers the overflow in (1) cgiChkMasterPwd.exe, (2) policyserver.exe as reachable through cgiABLogon.exe, and other vectors.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16768
exploitdb WRITEUP VERIFIED
by Luigi Auriemma · textdoswindows
https://www.exploit-db.com/exploits/31310
metasploit WORKING POC GOOD
by toto · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/trendmicro_officescan.rb

Scores

EPSS 0.7521
EPSS Percentile 98.9%

Details

CWE
CWE-119
Status published
Products (1)
trend_micro/officescan_corporate_edition < 7.3_patch3_build1314
Published Mar 17, 2008
Tracked Since Feb 18, 2026