exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Trend Micro Internet Security Pro 2009 Privilege Escalation

Trend Micro Internet Security Pro 2009 Privilege Escalation
Posted Apr 1, 2009
Authored by Nikita Tarakanov | Site securitylab.ru

Positive Technologies Research Team has discovered multiple privilege escalation vulnerabilities in Trend Micro products. The IOCTL handler in tmactmon.sys uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate buffer data associated with the Irp object, which allows local users to gain SYSTEM privileges.

tags | advisory, local, vulnerability
advisories | CVE-2009-0686
SHA-256 | 55ea736f59fb7ae8994b65029d905f7cae968eb2e5909d99df231a466897d933

Trend Micro Internet Security Pro 2009 Privilege Escalation

Change Mirror Download
----------------------------------------------------------------------

(PT-2009-09) Positive Technologies Security Advisory

Trend Micro Internet Security Pro 2009 tmactmon.sys Priviliege
Escalation Vulnerabilities

----------------------------------------------------------------------

---[ Affected Software ]

Trend Micro:
Trend Micro Internet Security Pro 2009
Trend Micro Internet Security 2009
Trend Micro Internet Security Pro 2008
Trend Micro Internet Security 2008

Product Link:
http://www.trendmicro.com


---[ Severity Rating ]

Severity: Medium
Impact: Priviliege Escalation
Attack Vector: Local

CVSS v2:
Base Score: 6.9
Temporal Score: 6.6
Vector: (AV:L/AC:M/Au:N/C:C/I:C/A:C/E:F/RL:U/RC:C)

CVE: CVE-2009-0686


---[ Software Description ]

Trend Micro(TM) Internet Security Pro provides comprehensive protection
against viruses, Trojan horse programs, worms, and other threats, including
network viruses and rootkits. It also blocks spyware, hackers, phishing
fraud attempts, and unwanted Web sites. It can filter your email messages
for spam as well.

---[ Vulnerability Description ]

Positive Technologies Research Team has discovered multiple priviliege
escalation vulnerabilities in Trend Micro products.

The IOCTL handler in tmactmon.sys uses the METHOD_NEITHER communication
method for IOCTLs and does not properly validate buffer data associated with
the Irp object, which allows local users to gain SYSTEM privilieges.


---[ Solution ]

Not available.

---[ Disclosure Timeline ]

02.04.2009 - Vendor notified
no response
02.12.2009 - Second notification
no response
03.31.2009 - Vulnerability details disclosed by third party
03.31.2009 - Public disclosure


---[ Credits ]

This vulnerability was discovered by Nikita Tarakanov, Positive Technologies
Research Team.


---[ References ]

http://en.securitylab.ru/lab/PT-2009-09
http://www.ptsecurity.ru/advisory.asp

Complete list of vulnerability reports published by Positive Technologies
Research Team:

http://en.securitylab.ru/lab/
http://www.ptsecurity.ru/advisory.asp


---[ About Positive Technologies ]

Positive Technologies www.ptsecurity.com is among the key players in the IT
security market in Russia.
The principal activities of the company include the development of
integrated tools for information security monitoring (MaxPatrol); providing
IT security consulting services and technical support; the development of
the Securitylab en.securitylab.ru leading Russian information security
portal.

Among the clients of Positive Technologies there are more than 40 state
enterprises, more than 50 banks and financial organizations, 20
telecommunication companies, more than 40 plant facilities, as well as IT,
service and retail companies from Russia, CIS countries, Baltic States,
China, Ecuador, Germany, Great Britain, Holland, Iran, Israel, Japan,
Mexico, South African Republic, Thailand, Turkey and USA.

Positive Technologies is a team of highly skilled developers, advisers and
experts with years of vast hands-on experience. The company specialists
possess professional titles and certificates; they are the members of
various international societies and are actively involved in the IT security
field development.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close