CVE Vulnerabilities

CVE-2007-0856

Published: Feb 08, 2007 | Modified: Jul 29, 2017
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the .TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.

Affected Software

Name Vendor Start Version End Version
Client-server-messaging_security Trend_micro 3.5 (including) 3.5 (including)
Damage_cleanup_services Trend_micro 3.2 (including) 3.2 (including)
Pc-cillin_internet_security Trend_micro 2007 (including) 2007 (including)
Tmcomm.sys Trend_micro 1.5.1052 (including) 1.5.1052 (including)
Trend_micro_antirootkit_common_module Trend_micro * *
Trend_micro_antispyware Trend_micro 3.0_sp2 (including) 3.0_sp2 (including)
Trend_micro_antispyware Trend_micro 3.2_sp1 (including) 3.2_sp1 (including)
Trend_micro_antispyware Trend_micro 3.5 (including) 3.5 (including)
Trend_micro_antivirus Trend_micro 2007 (including) 2007 (including)
Vsapini.sys Trend_micro 3.320.1003 (including) 3.320.1003 (including)

References