Advisory Details

June 13th, 2017

Trend Micro Maximum Security tmusa Kernel Driver Untrusted Pointer Dereference Denial of Service Vulnerability

ZDI-17-395
ZDI-CAN-4191

CVE ID
CVSS SCORE 4.7, (AV:L/AC:M/Au:N/C:N/I:N/A:C)
AFFECTED VENDORS Trend Micro
AFFECTED PRODUCTS Maximum Security
VULNERABILITY DETAILS


This vulnerability allows local attackers to deny service on vulnerable installations of Trend Micro Maximum Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the processing of IOCTL 0x00222813 in tmusa.sys. The issue results from the lack of proper validation of a user-supplied value prior to dereferencing it as a pointer. An attacker can leverage this to deny service to the system.

ADDITIONAL DETAILS Trend Micro has issued an update to correct this vulnerability. More details can be found at:
https://success.trendmicro.com/solution/1117509
DISCLOSURE TIMELINE
  • 2017-02-02 - Vulnerability reported to vendor
  • 2017-06-13 - Coordinated public release of advisory
CREDIT bee13oy of CloverSec Labs
BACK TO ADVISORIES