ESB-2017.2445 - [Win] Trend Micro OfficeScan: Execute arbitrary code/commands - Existing account 2017-09-28

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2445
         Trend Micro OfficeScan tmwfp Memory Corruption Privilege
                         Escalation Vulnerability
                             28 September 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Trend Micro OfficeScan
Publisher:         Zero Day Initiative
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account
                   Denial of Service               -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-14088  

Original Bulletin: 
   http://www.zerodayinitiative.com/advisories/ZDI-17-828/
   http://www.zerodayinitiative.com/advisories/ZDI-17-829/

Comment: This bulletin contains two (2) security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Trend Micro OfficeScan tmwfp Memory Corruption Privilege Escalation 
Vulnerability

ZDI-17-828: September 27th, 2017

CVE ID

CVE-2017-14088

CVSS Score

6.9, (AV:L/AC:M/Au:N/C:C/I:C/A:C)

Affected Vendors

Trend Micro

Affected Products

OfficeScan

Vulnerability Details

This vulnerability allows local attackers to execute arbitrary code on 
vulnerable installations of Trend Micro OfficeScan. An attacker must first 
obtain the ability to execute low-privileged code on the target system in 
order to exploit this vulnerability.

The specific flaw exists within the handling of IOCTL 0x220008 within 
tmwfp.sys. The issue results from the lack of proper validation of 
user-supplied data, which can result in a memory corruption condition. An 
attacker can leverage this vulnerability to escalate privileges to resources 
normally reserved for the kernel.

Vendor Response

Trend Micro has issued an update to correct this vulnerability. More details 
can be found at:

https://success.trendmicro.com/solution/1118372

Disclosure Timeline

2017-09-05 - Vulnerability reported to vendor

2017-09-27 - Coordinated public release of advisory

Credit

This vulnerability was discovered by:

zer0b4by

- ---

Trend Micro OfficeScan tmwfp Memory Corruption Privilege Escalation 
Vulnerability

ZDI-17-829: September 27th, 2017

CVE ID

CVE-2017-14088

CVSS Score

6.9, (AV:L/AC:M/Au:N/C:C/I:C/A:C)

Affected Vendors

Trend Micro

Affected Products

OfficeScan

Vulnerability Details

This vulnerability allows local attackers to execute arbitrary code on 
vulnerable installations of Trend Micro OfficeScan. An attacker must first 
obtain the ability to execute low-privileged code on the target system in 
order to exploit this vulnerability.

The specific flaw exists within the handling of IOCTL 0x22006C within 
tmwfp.sys. The issue results from the lack of proper validation of 
user-supplied data, which can result in a memory corruption condition. An 
attacker can leverage this vulnerability to escalate privileges to resources 
normally reserved for the kernel.

Vendor Response

Trend Micro has issued an update to correct this vulnerability. More details 
can be found at:

https://success.trendmicro.com/solution/1118372

Disclosure Timeline

2017-09-05 - Vulnerability reported to vendor

2017-09-27 - Coordinated public release of advisory

Credit

This vulnerability was discovered by:

zer0b4by

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=yNRH
-----END PGP SIGNATURE-----

« Back to bulletins