First published: Thu Feb 04 2021(Updated: )
This vulnerability allows local attackers to create a denial-of-service condition on affected installations of Trend Micro Antivirus for Mac. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the iCoreService executable. The issue results from the lack of proper validation of user-supplied data, which can result in a memory exhaustion condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Antivirus | =9.0 | |
Trendmicro Antivirus | =10.0 | |
Trendmicro Antivirus | =10.5 | |
Trendmicro Antivirus | =11.0 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-25227 is a vulnerability that allows local attackers to create a denial-of-service condition on affected installations of Trend Micro Antivirus for Mac.
To exploit this vulnerability, the target must visit a malicious page or open a malicious file, requiring user interaction.
Trend Micro Antivirus for Mac versions 9.0, 10.0, 10.5, and 11.0 are affected by this vulnerability.
The severity of CVE-2021-25227 is low, with a CVSS severity score of 3.3.
To fix CVE-2021-25227, it is recommended to update Trend Micro Antivirus for Mac to the latest version provided by the vendor.