JVN#98126322
Trend Micro Internet Security vulnerability where files may be excluded as scan targets
Overview
Trend Micro Internet Security provided by Trend Micro Incorporated contains a vulnerability where arbitrary files or folders may be excluded as scan targets.
Products Affected
- Trend Micro Internet Security 8
- Trend Micro Internet Security 10
Description
Trend Micro Internet Security provided by Trend Micro Incorporated contains a vulnerability where arbitrary files or folders may be excluded as scan targets when the conditions below are met.
- An attacker can place a specific file into the system
- The attacker can execute a specific API from the specific file
Impact
An arbitrary file or folder may be excluded as scan targets. As a result, the product may not be able to detect behavior of an unauthorized program.
Solution
Upgrade the Software
According to the developer, Trend Micro Internet Security 11 is not affected by this vulnerability.
Upgrade to Trend Micro Internet Security 11 or later according to the information provided by the developer.
Apply the Update Module
Apply the Update Module according to the information provided by the developer.
According to the developer, the Update Module is applied automatically when the system connects to the Internet.
For information on how to apply the Update Module manually, or how to check whether the module has been applied, refer to the information provided by the developer.
Vendor Status
Vendor | Link |
Trend Micro Incorporated | About the Vulnerability of Trend Micro Internet Security (July) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Access Vector(AV) | Local (L) | Adjacent Network (A) | Network (N) |
---|---|---|---|
Access Complexity(AC) | High (H) | Medium (M) | Low (L) |
Authentication(Au) | Multiple (M) | Single (S) | None (N) |
Confidentiality Impact(C) | None (N) | Partial (P) | Complete (C) |
Integrity Impact(I) | None (N) | Partial (P) | Complete (C) |
Availability Impact(A) | None (N) | Partial (P) | Complete (C) |
Credit
Trend Micro Incorporated reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Trend Micro Incorporated coordinated under the Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
|
JVN iPedia |
JVNDB-2016-000166 |