ID

VAR-201502-0459


CVE

CVE-2014-9641


TITLE

plural Trend Micro Product tmeext.sys Vulnerability written in arbitrary memory area in driver

Trust: 0.8

sources: JVNDB: JVNDB-2014-007857

DESCRIPTION

The tmeext.sys driver before 2.0.0.1015 in Trend Micro Antivirus Plus, Internet Security, and Maximum Security allows local users to write to arbitrary memory locations, and consequently gain privileges, via a crafted 0x00222400 IOCTL call. A security vulnerability exists in the tmeext.sys driver version prior to 2.0.0.1015. A local attacker can exploit this vulnerability to write to any memory location and obtain permissions through a specially crafted 0x00222400 IOCTL call

Trust: 2.61

sources: NVD: CVE-2014-9641 // JVNDB: JVNDB-2014-007857 // CNVD: CNVD-2015-01172 // BID: 77709 // IVD: cbe56c58-1e92-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: cbe56c58-1e92-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-01172

AFFECTED PRODUCTS

vendor:trend micromodel:tmeext.sysscope:ltversion:2.0.0.1015

Trust: 1.4

vendor:trendmicromodel:tmeext.sysscope:lteversion:2.0.0.1014

Trust: 1.0

vendor:trendmicromodel:tmeext.sysscope:eqversion:2.0.0.1014

Trust: 0.9

vendor:tmeext sysmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: cbe56c58-1e92-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-01172 // BID: 77709 // JVNDB: JVNDB-2014-007857 // CNNVD: CNNVD-201502-123 // NVD: CVE-2014-9641

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-9641
value: HIGH

Trust: 1.0

NVD: CVE-2014-9641
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-01172
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201502-123
value: HIGH

Trust: 0.6

IVD: cbe56c58-1e92-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2014-9641
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-01172
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: cbe56c58-1e92-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: cbe56c58-1e92-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-01172 // JVNDB: JVNDB-2014-007857 // CNNVD: CNNVD-201502-123 // NVD: CVE-2014-9641

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.8

sources: JVNDB: JVNDB-2014-007857 // NVD: CVE-2014-9641

THREAT TYPE

local

Trust: 0.9

sources: BID: 77709 // CNNVD: CNNVD-201502-123

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201502-123

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-007857

PATCH

title:Arbitrary Write Privilege Escalation Vulnerability on tmeext.sysurl:http://esupport.trendmicro.com/en-us/home/pages/technical-support/1106233.aspx

Trust: 0.8

title:Patch for multiple Trend Micro products tmeext.sys driver privilege elevation vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/55406

Trust: 0.6

sources: CNVD: CNVD-2015-01172 // JVNDB: JVNDB-2014-007857

EXTERNAL IDS

db:NVDid:CVE-2014-9641

Trust: 3.5

db:EXPLOIT-DBid:35962

Trust: 2.5

db:OSVDBid:115514

Trust: 1.6

db:CNVDid:CNVD-2015-01172

Trust: 0.8

db:CNNVDid:CNNVD-201502-123

Trust: 0.8

db:JVNDBid:JVNDB-2014-007857

Trust: 0.8

db:EXPLOITDBid:35962

Trust: 0.6

db:BIDid:77709

Trust: 0.3

db:IVDid:CBE56C58-1E92-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: cbe56c58-1e92-11e6-abef-000c29c66e3d // CNVD: CNVD-2015-01172 // BID: 77709 // JVNDB: JVNDB-2014-007857 // CNNVD: CNNVD-201502-123 // NVD: CVE-2014-9641

REFERENCES

url:http://esupport.trendmicro.com/en-us/home/pages/technical-support/1106233.aspx

Trust: 2.5

url:http://www.greyhathacker.net/?p=818

Trust: 1.9

url:http://www.exploit-db.com/exploits/35962

Trust: 1.9

url:http://www.osvdb.org/115514

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9641

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9641

Trust: 0.8

url:http://www.exploit-db.com/exploits/35962/

Trust: 0.6

sources: CNVD: CNVD-2015-01172 // BID: 77709 // JVNDB: JVNDB-2014-007857 // CNNVD: CNNVD-201502-123 // NVD: CVE-2014-9641

CREDITS

Unknown

Trust: 0.3

sources: BID: 77709

SOURCES

db:IVDid:cbe56c58-1e92-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2015-01172
db:BIDid:77709
db:JVNDBid:JVNDB-2014-007857
db:CNNVDid:CNNVD-201502-123
db:NVDid:CVE-2014-9641

LAST UPDATE DATE

2025-04-13T23:18:11.733000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-01172date:2015-02-13T00:00:00
db:BIDid:77709date:2015-02-06T00:00:00
db:JVNDBid:JVNDB-2014-007857date:2015-02-16T00:00:00
db:CNNVDid:CNNVD-201502-123date:2015-02-09T00:00:00
db:NVDid:CVE-2014-9641date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:IVDid:cbe56c58-1e92-11e6-abef-000c29c66e3ddate:2015-02-13T00:00:00
db:CNVDid:CNVD-2015-01172date:2015-02-14T00:00:00
db:BIDid:77709date:2015-02-06T00:00:00
db:JVNDBid:JVNDB-2014-007857date:2015-02-16T00:00:00
db:CNNVDid:CNNVD-201502-123date:2015-02-09T00:00:00
db:NVDid:CVE-2014-9641date:2015-02-06T15:59:08.757