Vulnerability Details : CVE-2017-14088
Memory Corruption Privilege Escalation vulnerabilities in Trend Micro OfficeScan 11.0 and XG allows local attackers to execute arbitrary code and escalate privileges to resources normally reserved for the kernel on vulnerable installations by exploiting tmwfp.sys. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit the vulnerability.
Vulnerability category: OverflowMemory CorruptionExecute codeGain privilege
Products affected by CVE-2017-14088
- cpe:2.3:a:trendmicro:officescan:11.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:trendmicro:officescan_xg:12.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-14088
0.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-14088
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST | |
7.0
|
HIGH | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.0
|
5.9
|
NIST |
CWE ids for CVE-2017-14088
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-14088
-
https://success.trendmicro.com/solution/1118372
Critical patches to fix multiple vulnerabilities - OfficeScanPatch;Vendor Advisory
-
http://www.zerodayinitiative.com/advisories/ZDI-17-829
ZDI-17-829 | Zero Day InitiativeThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/101070
Trend Micro OfficeScan CVE-2017-14088 Memory Corruption VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1039500
Trend Micro OfficeScan Multiple Flaws Let Remote Users Execute Arbitrary Code on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.zerodayinitiative.com/advisories/ZDI-17-828
ZDI-17-828 | Zero Day InitiativeThird Party Advisory;VDB Entry
Jump to