7.2

CVE-2007-0856

TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Trend MicroClient-server-messaging Security Version3.5 Editionsmb
Trend MicroTmcomm.Sys Version1.5.1052
Trend MicroTrend Micro Antispyware Version3.0_sp2 Editionenterprise
Trend MicroTrend Micro Antispyware Version3.2_sp1 Editionsmb
Trend MicroTrend Micro Antispyware Version3.5 Editionconsumer
Trend MicroVsapini.Sys Version3.320.1003
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.15% 0.363
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.2 3.9 10
AV:L/AC:L/Au:N/C:C/I:C/A:C