A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.
References
Link | Resource |
---|---|
http://esupport.trendmicro.com/support/vb/solution/ja-jp/1120144.aspx | Vendor Advisory |
https://esupport.trendmicro.com/en-US/home/pages/technical-support/1120237.aspx | Vendor Advisory |
http://esupport.trendmicro.com/support/vb/solution/ja-jp/1120144.aspx | Vendor Advisory |
https://esupport.trendmicro.com/en-US/home/pages/technical-support/1120237.aspx | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
21 Nov 2024, 04:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://esupport.trendmicro.com/support/vb/solution/ja-jp/1120144.aspx - Vendor Advisory | |
References | () https://esupport.trendmicro.com/en-US/home/pages/technical-support/1120237.aspx - Vendor Advisory |
Information
Published : 2018-07-06 19:29
Updated : 2024-11-21 04:05
NVD link : CVE-2018-3608
Mitre link : CVE-2018-3608
CVE.ORG link : CVE-2018-3608
JSON object : View
Products Affected
trendmicro
- officescan_monthly
- internet_security
- premium_security
- maximum_security
- officescan
- antivirus_\+_security
microsoft
- windows
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')