SB2023020863 - Multiple vulnerabilities in Trend Micro Worry-Free Business Security
Published: February 8, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Out-of-bounds write (CVE-ID: CVE-2022-44649)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in the Unauthorized Change Prevention service. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
2) Buffer overflow (CVE-ID: CVE-2022-44650)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Unauthorized Change Prevention service. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
3) Security features bypass (CVE-ID: CVE-2022-44654)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to presence of a monitor engine component that is complied without the /SAFESEH memory protection mechanism, which helps to monitor for malicious payloads. A remote attacker can abuse this to perform a denial of service attack against the antimalware engine.
4) Link following (CVE-ID: CVE-2022-45798)
The vulnerability allows a local user to delete arbitrary files on the system.
The
vulnerability exists due to insecure symlink following issue in the Damage Cleanup Engine component. A local user can
create a specially crafted symbolic link to a critical file on the
system and delete it.
Remediation
Install update from vendor's website.