Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2007-0856


TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.


Published

2007-02-08T18:28:00.000

Last Modified

2025-04-09T00:30:58.490

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.2 (HIGH)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.9

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application trend_micro client-server-messaging_security 3.5 Yes
Application trend_micro damage_cleanup_services 3.2 Yes
Application trend_micro pc-cillin_internet_security 2007 Yes
Application trend_micro tmcomm.sys 1.5.1052 Yes
Application trend_micro trend_micro_antirootkit_common_module * Yes
Application trend_micro trend_micro_antispyware 3.0_sp2 Yes
Application trend_micro trend_micro_antispyware 3.2_sp1 Yes
Application trend_micro trend_micro_antispyware 3.5 Yes
Application trend_micro trend_micro_antivirus 2007 Yes
Application trend_micro vsapini.sys 3.320.1003 Yes

References