Trend Micro Scan Engine Tmxpflt.sys Buffer Overflow

Medium Nessus Plugin ID 27583


The remote Windows host contains a program that is affected by a local buffer overflow vulnerability.


The version of Trend Micro AntiVirus installed on the remote Windows host contains a buffer overflow in its 'Tmxpflt.sys' kernel driver. A local attacker may be able to leverage this issue to execute arbitrary code on the affected system in kernel context.


Update to Scan Engine 8.550-1001 or later.

See Also

Plugin Details

Severity: Medium

ID: 27583

File Name: trendmicro_tmxpflt_overflow.nasl

Version: 1.17

Type: local

Agent: windows

Family: Windows

Published: 2007/10/26

Updated: 2018/11/15

Dependencies: 16192

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.6

Temporal Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:trend_micro:pc-cillin_internet_security_2007, cpe:/a:trend_micro:scan_engine

Required KB Items: Antivirus/TrendMicro/installed, Antivirus/TrendMicro/trendmicro_engine_version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2007/10/25

Reference Information

CVE: CVE-2007-4277

BID: 26209

CWE: 119, 264