A link following vulnerability in Trend Micro Deep Security 20.0 agents could allow a local attacker to create a denial of service (DoS) situation on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Deep_security_agent | Trendmicro | * | 20.0.1 (excluding) |
Deep_security_agent | Trendmicro | 20.0.1 (including) | 20.0.1 (including) |
Deep_security_agent | Trendmicro | 20.0.1-update12510 (including) | 20.0.1-update12510 (including) |
Deep_security_agent | Trendmicro | 20.0.1-update14610 (including) | 20.0.1-update14610 (including) |
Deep_security_agent | Trendmicro | 20.0.1-update17380 (including) | 20.0.1-update17380 (including) |
Deep_security_agent | Trendmicro | 20.0.1-update19250 (including) | 20.0.1-update19250 (including) |
Deep_security_agent | Trendmicro | 20.0.1-update21510 (including) | 20.0.1-update21510 (including) |
Deep_security_agent | Trendmicro | 20.0.1-update23340 (including) | 20.0.1-update23340 (including) |
Deep_security_agent | Trendmicro | 20.0.1-update3180 (including) | 20.0.1-update3180 (including) |
Deep_security_agent | Trendmicro | 20.0.1-update4540 (including) | 20.0.1-update4540 (including) |
Deep_security_agent | Trendmicro | 20.0.1-update690 (including) | 20.0.1-update690 (including) |
Deep_security_agent | Trendmicro | 20.0.1-update7380 (including) | 20.0.1-update7380 (including) |
Deep_security_agent | Trendmicro | 20.0.1-update9400 (including) | 20.0.1-update9400 (including) |