Vulnerability CVE-2007-0856


Published: 2007-02-08   Modified: 2012-02-12

Description:
TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Trend micro -> Client-server-messaging security 
Trend micro -> Damage cleanup services 
Trend micro -> Pc-cillin internet security 
Trend micro -> Tmcomm.sys 
Trend micro -> Trend micro antirootkit common module 
Trend micro -> Trend micro antispyware 
Trend micro -> Trend micro antivirus 
Trend micro -> Vsapini.sys 

 References:
http://www.kb.cert.org/vuls/id/666800
http://www.kb.cert.org/vuls/id/282240
http://secunia.com/advisories/24069
http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1034432&id=EN-1034432
http://www.vupen.com/english/advisories/2007/0521
http://www.securityfocus.com/bid/22448
http://securitytracker.com/id?1017606
http://securitytracker.com/id?1017605
http://securitytracker.com/id?1017604
http://osvdb.org/33039
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=469
http://xforce.iss.net/xforce/xfdb/32353

Copyright 2024, cxsecurity.com

 

Back to Top