CVE-2009-0686

N/A Unknown
Published: April 01, 2009 Modified: April 23, 2026
View on NVD

Description

The TrendMicro Activity Monitor Module (tmactmon.sys) 2.52.0.1002 in Trend Micro Internet Pro 2008 and 2009, and Security Pro 2008 and 2009, allows local users to gain privileges via a crafted IRP in a METHOD_NEITHER IOCTL request to \Device\tmactmon that overwrites memory.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.securityfocus.com/bid/34304
Source: cve@mitre.org
Exploit
http://en.securitylab.ru/lab/PT-2009-09
Source: af854a3a-2127-422b-91ae-364da2661108
http://milw0rm.com/sploits/2009-trendmicro_local_expl_0day.zip
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/archive/1/502314/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/34304
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securitytracker.com/id?1021955
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/49513
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/8322
Source: af854a3a-2127-422b-91ae-364da2661108

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
30th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

trendmicro