First published: Tue Oct 23 2018(Updated: )
A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F6A offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Antivirus | ||
Trend Micro Antivirus for Mac | >=7.0<=7.1.1124 | |
Trend Micro Antivirus for Mac 2018 | >=8.0<=8.0.3082 | |
Trend Micro Antivirus for Mac | >=9.0<=9.0.1356 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18328 has a moderate severity level due to its ability to allow local privilege escalation.
To fix CVE-2018-18328, update Trend Micro Antivirus for Mac to the latest version available.
CVE-2018-18328 affects Trend Micro Antivirus for Mac versions 7.0 and above, including all versions up to 9.0.
CVE-2018-18328 can be exploited by local attackers with access to the vulnerable system.
CVE-2018-18328 is classified as a privilege escalation vulnerability due to an untrusted pointer dereference.