CVE-2007-0856

N/A Unknown
Published: February 08, 2007 Modified: April 23, 2026
View on NVD

Description

TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/33039
Source: cve@mitre.org
http://secunia.com/advisories/24069
Source: cve@mitre.org
Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/282240
Source: cve@mitre.org
US Government Resource
http://www.kb.cert.org/vuls/id/666800
Source: cve@mitre.org
US Government Resource
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=469
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://osvdb.org/33039
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/24069
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://securitytracker.com/id?1017604
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1017605
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1017606
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/282240
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.kb.cert.org/vuls/id/666800
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.securityfocus.com/bid/22448
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/0521
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/32353
Source: af854a3a-2127-422b-91ae-364da2661108

24 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
35th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

trend_micro