CVE-2007-6386 (CNNVD-200712-158)
中文标题:
Trend Micro AntiVirus plus AntiSpyware PccScan.dll 栈溢出漏洞
英文标题:
Stack-based buffer overflow in PccScan.dll before build 1451 in Trend Micro AntiVirus plus AntiSpywa...
漏洞描述
中文描述:
Trend Micro AntiVirus plus AntiSpyware 2008, Internet Security 2008,和Internet Security Pro 2008中的PccScan.dll版本之前的版本build 1451中存在栈缓冲区溢出,用户协助式的远程攻击者可以借助有一个超长名称的畸形的.zip文件造成拒绝服务(SfCtlCom.exe 崩溃),并使本地用户获得特权,例如一个特制的 .uue文件中格式字符串指定创立的.zip文件。
英文描述:
Stack-based buffer overflow in PccScan.dll before build 1451 in Trend Micro AntiVirus plus AntiSpyware 2008, Internet Security 2008, and Internet Security Pro 2008 allows user-assisted remote attackers to cause a denial of service (SfCtlCom.exe crash), and allows local users to gain privileges, via a malformed .zip archive with a long name, as demonstrated by a .zip file created via format string specifiers in a crafted .uue file.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| trend_micro | trend_micro_antivirus_plus_antispyware | 2008 | - | - |
cpe:2.3:a:trend_micro:trend_micro_antivirus_plus_antispyware:2008:bld_1450:*:*:*:*:*:*
|
| trend_micro | trend_micro_internet_security__virus_bust | 2008 | - | - |
cpe:2.3:a:trend_micro:trend_micro_internet_security__virus_bust:2008:bld_1451:*:*:*:*:*:*
|
| trend_micro | trend_micro_internet_security_pro | * | - | - |
cpe:2.3:a:trend_micro:trend_micro_internet_security_pro:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
AV:L/AC:L/Au:N/C:C/I:C/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2007-6386 |
2025-11-11 15:17:57 | 2025-11-11 07:32:48 |
| NVD | nvd_CVE-2007-6386 |
2025-11-11 14:52:13 | 2025-11-11 07:41:35 |
| CNNVD | cnnvd_CNNVD-200712-158 |
2025-11-11 15:08:59 | 2025-11-11 07:49:22 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200712-158
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.2
- cvss_vector: NOT_EXTRACTED -> AV:L/AC:L/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 3
- data_sources: ['cve'] -> ['cve', 'nvd']