First published: Fri Mar 24 2006(Updated: )
ISNTSmtp directory in Trend Micro InterScan Messaging Security Suite (IMSS) 5.5 build 1183 and possibly other versions before 5.7.0.1121, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying ISNTSysMonitor.exe.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro InterScan Messaging Security Suite | =5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1380 is rated as critical due to its potential to allow local users to gain SYSTEM privileges.
To fix CVE-2006-1380, update to Trend Micro InterScan Messaging Security Suite version 5.7.0.1121 or later.
CVE-2006-1380 affects versions prior to 5.7.0.1121, specifically build 1183 and possibly earlier builds of version 5.5.
The impact of CVE-2006-1380 is that local users can modify critical system files, potentially leading to unauthorized system access.
Yes, a patch is available through the official update for Trend Micro InterScan Messaging Security Suite.