Quick Links

Support

Home > Support > Solution Details
 

[Vulnerability Response] Buffer overflow in Scan Engine Tmxpflt.sys 8.320.1004 and 8.500.1002
Solution ID: 1035793
Product: All Products
Operating System: N/A
Published: 10/23/07 10:32 PM


Problem:

A possible buffer overflow may occur in Scan Engine Tmxpflt.sys 8.320.1004 and 8.500.1002, and can allow an attacker to execute arbitrary code in kernel context.

Solution:

This vulnerability exists due to insecure permissions on the \\.\Tmfilter DOS device interface. The permissions on this device allow write access to everyone. This could allow a locally logged-in user to access functionality via IOCTLs, which was designed for privileged use only.

 

Risk Analysis

Related exploit range (AccessVector): Local

Attack complexity (AccessComplexity): Low

Level of authentication needed: Required

Confidentiality impact: None

Integrity impact: Complete

Availability impact: Complete

 

This vulnerability was reported to Trend Micro by iDefense Vulnerability Labs. It affects all Trend Micro products using the Scan Engine Filter.

 

The fix for this issue is included in Scan Engine 8.550-1001. This version will be available for download from the ActiveUpdate server on 30 October 2007.

 

For more information regarding the issues fixed by Scan Engine 8.550-1001, please refer to Issues resolved by Scan Engine 8.550-1001.


Rate this Solution!
Was this article helpful in solving your problem?
Yes No
How else can we improve this solution?
Use the box below to give us your feedback regarding this solution. If you need technical support please use the SUBMIT A QUESTION page.
 

<< Back to previous page  |  Back to main page 
Rate Online Support