CVE-2007-0856

Summary

CVECVE-2007-0856
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2007-02-08 18:28:00 UTC
Updated2017-07-29 01:30:00 UTC
DescriptionTmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.

Risk And Classification

Problem Types: NVD-CWE-Other

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Trend Micro Client-server-messaging Security 3.5 All smb All
Application Trend Micro Client-server-messaging Security 3.5 All smb All
Application Trend Micro Damage Cleanup Services 3.2 All All All
Application Trend Micro Damage Cleanup Services 3.2 All All All
Application Trend Micro Pc-cillin Internet Security 2007 All All All
Application Trend Micro Pc-cillin Internet Security 2007 All All All
Application Trend Micro Tmcomm.sys 1.5.1052 All All All
Application Trend Micro Tmcomm.sys 1.5.1052 All All All
Application Trend Micro Trend Micro Antirootkit Common Module All All All All
Application Trend Micro Trend Micro Antirootkit Common Module All All All All
Application Trend Micro Trend Micro Antispyware 3.0_sp2 All enterprise All
Application Trend Micro Trend Micro Antispyware 3.2_sp1 All smb All
Application Trend Micro Trend Micro Antispyware 3.5 All consumer All
Application Trend Micro Trend Micro Antispyware 3.0_sp2 All enterprise All
Application Trend Micro Trend Micro Antispyware 3.2_sp1 All smb All
Application Trend Micro Trend Micro Antispyware 3.5 All consumer All
Application Trend Micro Trend Micro Antivirus 2007 All All All
Application Trend Micro Trend Micro Antivirus 2007 All All All
Application Trend Micro Vsapini.sys 3.320.1003 All All All
Application Trend Micro Vsapini.sys 3.320.1003 All All All

References

ReferenceSourceLinkTags
US-CERT Vulnerability Notes CERT-VN www.kb.cert.org US Government Resource
Trend Micro Products IOCTL Handler Privilege Escalation - Advisories - Secunia SECUNIA secunia.com Patch, Vendor Advisory
20070207 Trend Micro TmComm Local Privilege Escalation Vulnerability IDEFENSE labs.idefense.com Vendor Advisory
PC-cillin Unsafe 'TmComm.sys' Driver Permissions Let Local Users Gain Elevated Privileges - SecurityTracker SECTRACK securitytracker.com
33039 OSVDB osvdb.org
US-CERT Vulnerability Note VU#282240 CERT-VN www.kb.cert.org US Government Resource
IBM X-Force Exchange XF exchange.xforce.ibmcloud.com
Trend Micro AntiVirus Scan Engine TMComm Local Privilege Escalation Vulnerability BID www.securityfocus.com
Webmail : Solution de messagerie professionnelle - OVHcloud- OVH VUPEN www.vupen.com
Trend Micro Antivirus Unsafe 'TmComm.sys' Driver Permissions Let Local Users Gain Elevated Privileges - SecurityTracker SECTRACK securitytracker.com
[Vulnerability Confirmation] TmComm Local Privilege Escalation Vulnerability [EN-1034432] CONFIRM esupport.trendmicro.com Patch
Trend Micro Anti-Spyware Unsafe 'TmComm.sys' Driver Permissions Let Local Users Gain Elevated Privileges - SecurityTracker SECTRACK securitytracker.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report