(PT-2009-09) Positive Technologies Security Advisory
Trend Micro Internet Security Pro 2009 tmactmon.sys Priviliege Escalation Vulnerabilities
Trend Micro Internet Security Pro 2009
Trend Micro Internet Security 2009
Trend Micro Internet Security Pro 2008
Trend Micro Internet Security 2008
Impact: Priviliege Escalation
Attack Vector: Local
Base Score: 6.9
Temporal Score: 6.6
Trend Micro(TM) Internet Security Pro provides comprehensive protection against viruses, Trojan horse programs, worms, and other
threats, including network viruses and rootkits. It also blocks spyware, hackers, phishing fraud attempts, and unwanted Web sites. It can filter your email messages for spam as well.
Positive Technologies Research Team has discovered multiple priviliege escalation vulnerabilities in Trend Micro products.
The IOCTL handler in tmactmon.sys uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate buffer data associated with the Irp object, which allows local users to gain SYSTEM privilieges.
02.04.2009 - Vendor notified
02.12.2009 - Second notification
03.31.2009 - Vulnerability details disclosed by third party
03.31.2009 - Public disclosure
This vulnerability was discovered by Nikita Tarakanov, Positive Technologies Research Team.
About Positive Technologies
Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. Our solutions work seamlessly across your entire business: securing applications in development; assessing your network and application vulnerabilities; assuring compliance with regulatory requirements; and blocking real-time attacks. Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, and distinction as the #1 fastest growing Security and Vulnerability Management firm in 2012, as shown in an IDC report*. To learn more about Positive Technologies please visit www.ptsecurity.com
*Source: IDC Worldwide Security and Vulnerability Management 2013-2017 Forecast and 2012 Vendor Shares, doc #242465, August 2013. Based on year-over-year revenue growth in 2012 for vendors with revenues of $20M+