Trend Micro Scan Engine Tmxpflt.sys Buffer Overflow

medium Nessus Plugin ID 27583

Synopsis

The remote Windows host contains a program that is affected by a local buffer overflow vulnerability.

Description

The version of Trend Micro AntiVirus installed on the remote Windows host contains a buffer overflow in its 'Tmxpflt.sys' kernel driver. A local attacker may be able to leverage this issue to execute arbitrary code on the affected system in kernel context.

Solution

Update to Scan Engine 8.550-1001 or later.

See Also

http://www.nessus.org/u?5d005b51

https://www.securityfocus.com/archive/1/482794/30/0/threaded

http://www.nessus.org/u?716206ce

http://www.nessus.org/u?ff991f13

Plugin Details

Severity: Medium

ID: 27583

File Name: trendmicro_tmxpflt_overflow.nasl

Version: 1.17

Type: local

Agent: windows

Family: Windows

Published: 10/26/2007

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 6.6

Temporal Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:C/A:C

Vulnerability Information

CPE: cpe:/a:trend_micro:pc-cillin_internet_security_2007, cpe:/a:trend_micro:scan_engine

Required KB Items: Antivirus/TrendMicro/installed, Antivirus/TrendMicro/trendmicro_engine_version

Exploit Ease: No known exploits are available

Patch Publication Date: 10/25/2007

Reference Information

CVE: CVE-2007-4277

BID: 26209

CWE: 119, 264