CVE-2014-9641

The tmeext.sys driver before 2.0.0.1015 in Trend Micro Antivirus Plus, Internet Security, and Maximum Security allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x00222400 IOCTL call.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trendmicro:tmeext.sys:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:21

Type Values Removed Values Added
References () http://esupport.trendmicro.com/en-us/home/pages/technical-support/1106233.aspx - Vendor Advisory () http://esupport.trendmicro.com/en-us/home/pages/technical-support/1106233.aspx - Vendor Advisory
References () http://www.exploit-db.com/exploits/35962 - Exploit () http://www.exploit-db.com/exploits/35962 - Exploit
References () http://www.greyhathacker.net/?p=818 - Exploit () http://www.greyhathacker.net/?p=818 - Exploit
References () http://www.osvdb.org/115514 - () http://www.osvdb.org/115514 -

Information

Published : 2015-02-06 15:59

Updated : 2024-11-21 02:21


NVD link : CVE-2014-9641

Mitre link : CVE-2014-9641

CVE.ORG link : CVE-2014-9641


JSON object : View

Products Affected

trendmicro

  • tmeext.sys
CWE
CWE-264

Permissions, Privileges, and Access Controls