First published: Tue Oct 23 2018(Updated: )
A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F4E offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Antivirus | ||
Trend Micro Antivirus for Mac | >=7.0<=7.1.1124 | |
Trend Micro Antivirus for Mac 2018 | >=8.0<=8.0.3082 | |
Trend Micro Antivirus for Mac | >=9.0<=9.0.1356 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18329 has a medium severity level due to its potential for privilege escalation.
To fix CVE-2018-18329, you should update Trend Micro Antivirus for Mac to the latest version that contains the patch.
CVE-2018-18329 affects users of Trend Micro Antivirus for Mac versions 7.0 and above, specifically from the year 2017 and up.
CVE-2018-18329 is classified as a privilege escalation vulnerability due to untrusted pointer dereference.
CVE-2018-18329 cannot be exploited remotely as it requires local access to the vulnerable system.