Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2017.2445 Trend Micro OfficeScan tmwfp Memory Corruption Privilege Escalation Vulnerability 28 September 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Trend Micro OfficeScan Publisher: Zero Day Initiative Operating System: Windows Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Denial of Service -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2017-14088 Original Bulletin: http://www.zerodayinitiative.com/advisories/ZDI-17-828/ http://www.zerodayinitiative.com/advisories/ZDI-17-829/ Comment: This bulletin contains two (2) security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Trend Micro OfficeScan tmwfp Memory Corruption Privilege Escalation Vulnerability ZDI-17-828: September 27th, 2017 CVE ID CVE-2017-14088 CVSS Score 6.9, (AV:L/AC:M/Au:N/C:C/I:C/A:C) Affected Vendors Trend Micro Affected Products OfficeScan Vulnerability Details This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Trend Micro OfficeScan. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of IOCTL 0x220008 within tmwfp.sys. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to escalate privileges to resources normally reserved for the kernel. Vendor Response Trend Micro has issued an update to correct this vulnerability. More details can be found at: https://success.trendmicro.com/solution/1118372 Disclosure Timeline 2017-09-05 - Vulnerability reported to vendor 2017-09-27 - Coordinated public release of advisory Credit This vulnerability was discovered by: zer0b4by - --- Trend Micro OfficeScan tmwfp Memory Corruption Privilege Escalation Vulnerability ZDI-17-829: September 27th, 2017 CVE ID CVE-2017-14088 CVSS Score 6.9, (AV:L/AC:M/Au:N/C:C/I:C/A:C) Affected Vendors Trend Micro Affected Products OfficeScan Vulnerability Details This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Trend Micro OfficeScan. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of IOCTL 0x22006C within tmwfp.sys. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to escalate privileges to resources normally reserved for the kernel. Vendor Response Trend Micro has issued an update to correct this vulnerability. More details can be found at: https://success.trendmicro.com/solution/1118372 Disclosure Timeline 2017-09-05 - Vulnerability reported to vendor 2017-09-27 - Coordinated public release of advisory Credit This vulnerability was discovered by: zer0b4by - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWcwzFIx+lLeg9Ub1AQhCMQ//RO8rSC+licFTGDNJdWhzXiCTu8iwrUjQ y/g1GOi0gUfo+nPul0ClUCX2ybicf/rAHTMjqtxtglHA8/dJckoJzC96PH58zS5s 7bvgvJ/ZTTIi8e9mtW9SBzA6m7uIBBOQrJWIH+PNDhhnn0XxWbmFCOU+dmxAUJHo S+mFXJUNtM43cWy6OkiR9SNHwUoEUU/8WM+lWC53KtSf1SKeaSxGTd6posgfHHxU TsVLnaLC36YdN0l8YA0nbUk30jbGGqIBh1NnT8Dz28QKa6jCxJQVoVTR/i3Ddzpi N7s5SMcAvjhgALSFMfAr6pnkP3iDXgcpgFwLY8FZO2UIgJTjoBJOnjWjKYKylJHc sfvKbGvjiwF/MPx8hv07dQG048pk5zjfJEJ2W6wbN3P/VTm7Zzq6DsIDJgVTZsGq 3wVG1bhwAgjDbVdhYKQl9rJt9kt5M6SygHq00661LSoOVsfVDqesKNVlgm2HvMEn i5V8c2BlvYL205oHYrGuDJvtYBGmW7AcKovka5C8DFYJfhc4YrbLVShqEGhkc/NL GwqziRiluxK9IAIL62Bpd0LP/HNsfiwyDL/6wPv5Kw1cBo0y05l7kB5ooTWLdZA5 7VdRmZ1R2b3w4ufjgF3vnxPuETxgjzY/kCD5jQmNycuEo2NxCKmrCkukUweE5XWa GH9IYDX/k9w= =yNRH -----END PGP SIGNATURE-----