Trend Micro updates to fix Scan Engine vulnerability

By
Follow google news

Trend Micro has confirmed a vulnerability in its Scan Engine application that could be exploited by malicious users to take control of an affected system.


An attacker could use a corrupted UPX (Ultimate Packer for Executables) file to cause a buffer overflow via the flaw. Trend Micro has released an update that fixes the vulnerability.

Successful exploitation can cause a DoS attack or allow an attacker to assume remote control of an affected system, according to a Trend Micro advisory.

The flaw exists in all Trend Micro products and versions using the Scan Engine and Pattern File, according to the company.

Secunia said in an alert updated today that the flaw is "highly critical," which means it can be exploited from a remote location.

Click here to email Online Editor Frank Washkuch Jr.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

Poor WA gov M365 security led to $71k theft and children's data breached

Poor WA gov M365 security led to $71k theft and children's data breached

US medical device maker Stryker's Microsoft environment attacked

US medical device maker Stryker's Microsoft environment attacked

CBA chief impersonated in global investment fraud on Facebook

CBA chief impersonated in global investment fraud on Facebook

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Log In

  |  Forgot your password?