First published: Tue Oct 23 2018(Updated: )
A UrlfWTPPagePtr KERedirect Use-After-Free Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Antivirus | ||
Trend Micro Antivirus for Mac | >=7.0<=7.1.1124 | |
Trend Micro Antivirus for Mac 2018 | >=8.0<=8.0.3082 | |
Trend Micro Antivirus for Mac | >=9.0<=9.0.1356 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15366 has a medium severity level, indicating it poses a moderate risk of exploitation.
To fix CVE-2018-15366, update Trend Micro Antivirus for Mac to the latest version available.
CVE-2018-15366 affects Trend Micro Antivirus for Mac versions 7.0 and above.
CVE-2018-15366 requires local access for exploitation, meaning an attacker must have physical or local access to the system.
CVE-2018-15366 is classified as a 'Use-After-Free' privilege escalation vulnerability.