First published: Tue Oct 23 2018(Updated: )
A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6eDC offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Antivirus | ||
Trend Micro Antivirus for Mac | >=7.0<=7.1.1124 | |
Trend Micro Antivirus for Mac 2018 | >=8.0<=8.0.3082 | |
Trend Micro Antivirus for Mac | >=9.0<=9.0.1356 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-18327 is high due to its potential to allow privilege escalation.
To fix CVE-2018-18327, update Trend Micro Antivirus for Mac to the latest version that addresses this vulnerability.
CVE-2018-18327 affects Trend Micro Antivirus for Mac versions 7.0 (2017) and above, including 8.0 and 9.0.
CVE-2018-18327 is a KERedirect Untrusted Pointer Dereference vulnerability that allows privilege escalation.
A local attacker can exploit CVE-2018-18327 to escalate privileges on vulnerable installations.