This vulnerability allows local attackers to escalate privileges on vulnerable installations of Trend Micro Anti-Virus. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the KERedirect kext. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this vulnerability to execute code in the context of the kernel.
Affected Software | Affected Version | How to fix |
---|---|---|
Trend Micro Antivirus |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-18-1295 is considered high due to its potential for privilege escalation.
Organizations using vulnerable installations of Trend Micro Anti-Virus are affected by ZDI-18-1295.
To fix ZDI-18-1295, update your Trend Micro Anti-Virus software to the latest version provided by the vendor.
ZDI-18-1295 cannot be exploited remotely; an attacker must first obtain local access.
The potential impacts of ZDI-18-1295 include unauthorized access to system resources and sensitive information due to privilege escalation.