CVE-2018-18327 – Trend Micro Anti-Virus KERedirect Untrusted Pointer Dereference Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2018-18327
A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6eDC offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de desreferencia de puntero no fiable y escalado de privilegios en KERedirect en Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) podría permitir que un atacante local escale privilegios en instalaciones vulnerables. El problema resulta de la falta de una función de validación adecuada en el búfer de desplazamiento 0x6eDC proporcionado por el usuario. • http://www.securityfocus.com/bid/105757 https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx https://www.zerodayinitiative.com/advisories/ZDI-18-1295 • CWE-476: NULL Pointer Dereference •
CVE-2018-15366 – Trend Micro Anti-Virus UrlfWTPPagePtr KERedirect Use-After-Free Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2018-15366
A UrlfWTPPagePtr KERedirect Use-After-Free Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de escalado de privilegios y uso de memoria previamente liberada UrlfWTPPagePtr KERedirect en Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) podría permitir que un atacante local escale privilegios en instalaciones vulnerables. En primer lugar, un atacante debe obtener la capacidad de ejecutar código de bajos privilegios en el sistema objetivo para explotar esta vulnerabilidad. This vulnerability allows local attackers to escalate privileges on vulnerable installations of Trend Micro Anti-Virus. • http://www.securityfocus.com/bid/105757 https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx https://www.zerodayinitiative.com/advisories/ZDI-18-1293 • CWE-416: Use After Free •
CVE-2018-18328 – Trend Micro Anti-Virus KERedirect Untrusted Pointer Dereference Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2018-18328
A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F6A offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. Una vulnerabilidad de desreferencia de puntero no fiable y escalado de privilegios en KERedirect en Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) podría permitir que un atacante local escale privilegios en instalaciones vulnerables. El problema resulta de la falta de una función de validación adecuada en el búfer de desplazamiento 0x6F6A proporcionado por el usuario. • http://www.securityfocus.com/bid/105757 https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx https://www.zerodayinitiative.com/advisories/ZDI-18-1296 • CWE-476: NULL Pointer Dereference •
CVE-2018-15365
https://notcve.org/view.php?id=CVE-2018-15365
A Reflected Cross-Site Scripting (XSS) vulnerability in Trend Micro Deep Discovery Inspector 3.85 and below could allow an attacker to bypass CSRF protection and conduct an attack on vulnerable installations. An attacker must be an authenticated user in order to exploit the vulnerability. Una vulnerabilidad de Cross-Site Scripting (XSS) reflejado en Trend Micro Deep Discovery Inspector en versiones 3.85 y anteriores podría permitir que un atacante omita la protección CSRF y lleve a cabo un ataque en instalaciones vulnerables. El atacante debe ser un usuario autenticado para explotar esta vulnerabilidad. • https://github.com/nixwizard/CVE-2018-15365 https://success.trendmicro.com/solution/1121079 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-10513 – Trend Micro Maximum Security ID_AMSP_MASTER Deserialization of Untrusted Data Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2018-10513
A Deserialization of Untrusted Data Privilege Escalation vulnerability in Trend Micro Security 2018 (Consumer) products could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability. Una vulnerabilidad de deserialización de datos no fiables y de escalado de privilegios en productos Trend Micro Security 2018 (Consumer) podría permitir que un atacante local escale privilegios en instalaciones vulnerables. En primer lugar, un atacante debe obtener la habilidad para ejecutar código de bajos privilegios en el sistema objetivo para explotar esta vulnerabilidad. This vulnerability allows local attackers to escalate privileges on vulnerable installations of Trend Micro Maximum Security. • https://esupport.trendmicro.com/en-US/home/pages/technical-support/1120742.aspx https://www.zerodayinitiative.com/advisories/ZDI-18-961 • CWE-502: Deserialization of Untrusted Data •