Vulnerability Note VU#282240

Trend Micro Anti-Rootkit Common Module fails to properly restrict access to the "\\.\TmComm" DOS device interface

Original Release date: 09 Feb 2007 | Last revised: 06 Mar 2007


A vulnerability exists in Trend Micro's Anti-Rootkit Common Module that may allow a local attacker to gain elevated privileges.


Trend Micro AntiVirus is a virus scanner for Microsoft Windows and Linux. The Trend Micro Anti-Rootkit Common Module is included with Trend Micro security suites and other anti-virus products.

The IOCTL handlers for the DOS device interface included with Trend Micro's Anti-Rootkit Common Module fails to properly validate permissions. Local users are not properly restricted from accessing fucntionality designed for privileged use on the \\.\TmComm DOS device interface.


A local attacker may be able to execute arbitrary code or overwrite arbitrary memory in the kernel.


Apply an update
Trend Micro has released an update to address this issue.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Trend MicroAffected-08 Feb 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This issue is addressed in Trend Micro solution 1034432. Trend Micro credits Ruben Santamarta working with the iDefense Contributor Program for reporting this issue.

This document was written by Chris Taschner.

Other Information

  • CVE IDs: CVE-2007-0856
  • Date Public: 07 Feb 2007
  • Date First Published: 09 Feb 2007
  • Date Last Updated: 06 Mar 2007
  • Severity Metric: 8.25
  • Document Revision: 15


If you have feedback, comments, or additional information about this vulnerability, please send us email.