First published: Tue Oct 30 2007(Updated: )
The Trend Micro AntiVirus scan engine before 8.550-1001, as used in Trend Micro PC-Cillin Internet Security 2007, and Tmxpflt.sys 8.320.1004 and 8.500.0.1002, has weak permissions (Everyone:Write) for the \\.\Tmfilter device, which allows local users to send arbitrary content to the device via the IOCTL functionality. NOTE: this can be leveraged for privilege escalation by exploiting a buffer overflow in the handler for IOCTL 0xa0284403.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro PC-cillin | ||
Trend Micro Scan Engine | <=8.500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4277 is rated as a high-severity vulnerability due to its potential to allow local users to send arbitrary content to the device.
To fix CVE-2007-4277, update the Trend Micro AntiVirus scan engine to version 8.550-1001 or later.
CVE-2007-4277 affects Trend Micro PC-Cillin Internet Security 2007 and the Trend Micro scan engine versions up to 8.500.
CVE-2007-4277 can be exploited through local privilege escalation, allowing unauthorized access to system resources.
A temporary workaround for CVE-2007-4277 may involve restricting write permissions on the \\.\Tmfilter device until an update is applied.