2 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The installation of Trend Micro PC-Cillin Internet Security 2005 12.00 build 1244, and probably previous versions, uses insecure default ACLs, which allows local users to cause a denial of service (disabled service) and gain system privileges by modifying or moving critical program files. La instalación de Tren Micro PC Cillin Internet Security 2005 12.00 compilación 1244, y posiblemente versiones anteriores, utiliza ACLs (Listas de Control de Acceso) por defecto inseguras, lo que permite a usuarios locales causar una denegación de servicio (servicio deshabilitado) y ganar privilegios de sistema modificando o moviendo archivos de programa críticos. • http://secunia.com/advisories/18044 http://securitytracker.com/id?1015357 http://www.idefense.com/application/poi/display?id=351&type=vulnerabilities http://www.securityfocus.com/bid/15872 http://www.vupen.com/english/advisories/2005/2906 •

CVSS: 5.1EPSS: 1%CPEs: 2EXPL: 0

Multiple interpretation error in Trend Micro (1) PC-Cillin 2005 12.0.1244 with the 7.510.1002 engine and (2) OfficeScan 7.0 with the 7.510.1002 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an "MZ" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a "triple headed" program that contains EXE, EML, and HTML content, aka the "magic byte bug." • http://marc.info/?l=bugtraq&m=113026417802703&w=2 http://www.securityelf.org/magicbyte.html http://www.securityelf.org/magicbyteadv.html http://www.securityelf.org/updmagic.html http://www.securityfocus.com/archive/1/415173 http://www.securityfocus.com/bid/15189 •