Vulnerability Description
Trend Micro OfficeScan 5.5, and probably other versions before 6.5, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying tmlisten.exe.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trend Micro | Officescan | 5.5 |
References
- http://secunia.com/advisories/11576Vendor Advisory
- http://www.secumind.net/content/french/modules/news/article.php?storyid=9&sel_laURL Repurposed
- http://www.vupen.com/english/advisories/2006/1041
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25415
- http://secunia.com/advisories/11576Vendor Advisory
- http://www.secumind.net/content/french/modules/news/article.php?storyid=9&sel_laURL Repurposed
- http://www.vupen.com/english/advisories/2006/1041
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25415
FAQ
What is CVE-2006-1381?
CVE-2006-1381 is a vulnerability with a CVSS score of 10.0 (HIGH). Trend Micro OfficeScan 5.5, and probably other versions before 6.5, uses insecure DACLs for critical files, which allows local users to gain SYSTEM privileges by modifying tmlisten.exe.
How severe is CVE-2006-1381?
CVE-2006-1381 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1381?
Check the references section above for vendor advisories and patch information. Affected products include: Trend Micro Officescan.