Vulnerability Description
Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows local users to gain privileges by leveraging an unrestricted quarantine directory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trendmicro | Serverprotect | 3.0 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-DisclosureExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2017/May/91ExploitMailing ListThird Party Advisory
- http://www.securitytracker.com/id/1038548Third Party AdvisoryVDB Entry
- https://success.trendmicro.com/solution/1117411PatchVendor Advisory
- https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulneExploitTechnical DescriptionThird Party Advisory
- http://packetstormsecurity.com/files/142645/Trend-Micro-ServerProtect-DisclosureExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2017/May/91ExploitMailing ListThird Party Advisory
- http://www.securitytracker.com/id/1038548Third Party AdvisoryVDB Entry
- https://success.trendmicro.com/solution/1117411PatchVendor Advisory
- https://www.coresecurity.com/advisories/trend-micro-serverprotect-multiple-vulneExploitTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2017-9036?
CVE-2017-9036 is a vulnerability with a CVSS score of 7.8 (HIGH). Trend Micro ServerProtect for Linux 3.0 before CP 1531 allows local users to gain privileges by leveraging an unrestricted quarantine directory.
How severe is CVE-2017-9036?
CVE-2017-9036 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-9036?
Check the references section above for vendor advisories and patch information. Affected products include: Trendmicro Serverprotect.