Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below have a vulnerability that may allow an attacker to place malicious files in the same directory, potentially leading to arbitrary remote code execution (RCE) when executed.
The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Link | Tags |
---|---|
https://success.trendmicro.com/solution/000149878 | vendor advisory |
http://hyp3rlinx.altervista.org/advisories/TREND-MICRO-ANTI-THREAT-TOOLKIT-%28ATTK%29-REMOTE-CODE-EXECUTION.txt | |
https://seclists.org/bugtraq/2019/Oct/30 | mailing list exploit third party advisory |
http://seclists.org/fulldisclosure/2019/Oct/42 | mailing list exploit third party advisory |
https://seclists.org/bugtraq/2020/Jan/55 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/156160/TrendMicro-Anti-Threat-Toolkit-Improper-Fix.html | exploit vdb entry third party advisory |
http://seclists.org/fulldisclosure/2020/Jan/50 | mailing list exploit third party advisory |