Memory Corruption Privilege Escalation vulnerabilities in Trend Micro OfficeScan 11.0 and XG allows local attackers to execute arbitrary code and escalate privileges to resources normally reserved for the kernel on vulnerable installations by exploiting tmwfp.sys. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://success.trendmicro.com/solution/1118372 | patch vendor advisory |
http://www.securityfocus.com/bid/101070 | vdb entry third party advisory |
http://www.zerodayinitiative.com/advisories/ZDI-17-828 | vdb entry third party advisory |
http://www.securitytracker.com/id/1039500 | vdb entry third party advisory |
http://www.zerodayinitiative.com/advisories/ZDI-17-829 | vdb entry third party advisory |