7.2
CWE
NVD-CWE-Other
Advisory Published
Updated

CVE-2007-0856

First published: Thu Feb 08 2007(Updated: )

TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Trend Micro Trend Micro Antispyware=3.2_sp1
Trend Micro Damage Cleanup Services=3.2
Trend Micro Trend Micro Antispyware=3.0_sp2
Trend Micro Tmcomm.sys=1.5.1052
Trend Micro Trend Micro Antirootkit Common Module
Trend Micro PC-cillin Internet Security=2007
Trend Micro Client-server-messaging Security=3.5
Trend Micro Vsapini.sys=3.320.1003
Trend Micro Trend Micro Antivirus=2007
Trend Micro Trend Micro Antispyware=3.5

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203