First published: Fri Mar 24 2006(Updated: )
Trend Micro PC-cillin Internet Security 2006 14.00.1485 and 14.10.0.1023, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying executable programs such as (1) tmntsrv.exe and (2) tmproxy.exe.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Pc-cillin 2006 | =14.00.1485 | |
Trend Micro Pc-cillin 2006 | <=14.10.0.1023 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-1379 is considered high due to the potential for local users to gain SYSTEM privileges.
To fix CVE-2006-1379, ensure that the DACLs for critical files are configured securely to prevent unauthorized access.
CVE-2006-1379 affects Trend Micro PC-cillin versions 14.00.1485 and up to 14.10.0.1023.
Exploiting CVE-2006-1379 allows local users to gain elevated privileges, potentially compromising the entire system.
As of now, there is no specific public patch provided for CVE-2006-1379; users are advised to apply DACL security best practices.