First published: Tue Oct 23 2018(Updated: )
A ctl_set KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Antivirus | ||
Trend Micro Antivirus for Mac | >=7.0<=7.1.1124 | |
Trend Micro Antivirus for Mac 2018 | >=8.0<=8.0.3082 | |
Trend Micro Antivirus for Mac | >=9.0<=9.0.1356 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15367 has a medium severity rating as it allows local attackers to escalate privileges.
To fix CVE-2018-15367, ensure that you are using the latest version of Trend Micro Antivirus for Mac, as updates include security patches.
CVE-2018-15367 affects Trend Micro Antivirus for Mac versions 7.0 and above, including specific versions up to 9.0.1356.
CVE-2018-15367 is classified as a KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability.
CVE-2018-15367 can be exploited by local attackers who already have the ability to execute code on the vulnerable systems.