ID

VAR-201802-0931


CVE

CVE-2018-6218


TITLE

Insecure DLL Loading issue in multiple Trend Micro products

Trust: 0.8

sources: JVNDB: JVNDB-2018-000013

DESCRIPTION

A DLL Hijacking vulnerability in Trend Micro's User-Mode Hooking Module (UMH) could allow an attacker to run arbitrary code on a vulnerable system. Multiple products provided by Trend Micro Incorporated contain an insecure DLL loading issue (CWE-427). When invoking the installers of other applications while the concerned products are installed to the PC, the DLL placed in the same directory as the the installers (of the other applications) may be insecurely loaded. Hidenori Ohta of Mitsubishi Electric Information Systems Corporation reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.Arbitrary code may be executed with the privilege of the user invoking the installer of other applications. A remote attacker can leverage this issue to execute arbitrary code in the context of the affected application. Failed exploit attempts will result in a denial of service condition

Trust: 1.98

sources: NVD: CVE-2018-6218 // JVNDB: JVNDB-2018-000013 // BID: 103096 // VULHUB: VHN-136250

AFFECTED PRODUCTS

vendor:trend micromodel:endpoint sensorscope:eqversion:1.6

Trust: 1.7

vendor:trend micromodel:deep securityscope:eqversion:10.0

Trust: 1.7

vendor:trendmicromodel:securityscope:eqversion:12.0

Trust: 1.0

vendor:trendmicromodel:endpoint sensorscope:eqversion:1.6

Trust: 1.0

vendor:trendmicromodel:worry-free business securityscope:eqversion:9.5

Trust: 1.0

vendor:trendmicromodel:deep securityscope:eqversion:10.1

Trust: 1.0

vendor:trendmicromodel:officescanscope:eqversion:11.0

Trust: 1.0

vendor:trendmicromodel:officescanscope:eqversion:12.0

Trust: 1.0

vendor:trendmicromodel:deep securityscope:eqversion:10.0

Trust: 1.0

vendor:trend micromodel:worry-free business securityscope:eqversion:9.5

Trust: 0.9

vendor:trend micromodel:officescanscope:eqversion:11.0

Trust: 0.9

vendor:trend micromodel:deep securityscope:eqversion:10.1

Trust: 0.9

vendor:trend micromodel:officescanscope:eqversion:version 11.0

Trust: 0.8

vendor:trend micromodel:officescanscope:eqversion:xg (version 12)

Trust: 0.8

vendor:trend micromodel:deep securityscope:eqversion:10.1 (feature release)

Trust: 0.8

vendor:trend micromodel:securityscope:eqversion:(consumer) all 2018 (v12) versions

Trust: 0.8

vendor:trend micromodel:worry-free business securityscope:eqversion:version 9.5 (standard/advanced)

Trust: 0.8

vendor:trend micromodel:worry-free business security servicesscope: - version: -

Trust: 0.8

vendor:trend micromodel:securityscope:eqversion:12

Trust: 0.6

vendor:trend micromodel:officescanscope:eqversion:12

Trust: 0.6

vendor:trend micromodel:officescanscope:eqversion:12.0

Trust: 0.6

vendor:trend micromodel:premium securityscope:eqversion:12.0

Trust: 0.3

vendor:trend micromodel:officescan business securityscope:eqversion:9.5

Trust: 0.3

vendor:trend micromodel:officescan xgscope:eqversion:11

Trust: 0.3

vendor:trend micromodel:officescan xgscope:eqversion:(12.0)

Trust: 0.3

vendor:trend micromodel:maximum securityscope:eqversion:12.0

Trust: 0.3

vendor:trend micromodel:internet securityscope:eqversion:12.0

Trust: 0.3

vendor:trend micromodel:antivirus+ securityscope:eqversion:12.0

Trust: 0.3

vendor:trend micromodel:worry-free business security patchscope:neversion:9.51

Trust: 0.3

vendor:trend micromodel:officescan business security patch (buildscope:neversion:9.511

Trust: 0.3

vendor:trend micromodel:endpoint sensor update (cpscope:neversion:1.63310

Trust: 0.3

vendor:trend micromodel:deep securityscope:neversion:10.2

Trust: 0.3

vendor:trend micromodel:deep security 10.0 u5 cpscope:neversion: -

Trust: 0.3

sources: BID: 103096 // JVNDB: JVNDB-2018-000013 // CNNVD: CNNVD-201802-873 // NVD: CVE-2018-6218

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-6218
value: HIGH

Trust: 1.0

IPA: JVNDB-2018-000013
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201802-873
value: HIGH

Trust: 0.6

VULHUB: VHN-136250
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-6218
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2018-000013
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-136250
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 4.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-6218
baseSeverity: HIGH
baseScore: 7.0
vectorString: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.0
impactScore: 5.9
version: 3.1

Trust: 1.0

IPA: JVNDB-2018-000013
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-136250 // JVNDB: JVNDB-2018-000013 // CNNVD: CNNVD-201802-873 // NVD: CVE-2018-6218

PROBLEMTYPE DATA

problemtype:CWE-426

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-136250 // JVNDB: JVNDB-2018-000013 // NVD: CVE-2018-6218

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201802-873

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201802-873

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-000013

PATCH

title:Solution Id: 1119326url:https://success.trendmicro.com/solution/1119326

Trust: 0.8

title:Trend Micro's User-Mode Hooking Module Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=159149

Trust: 0.6

sources: JVNDB: JVNDB-2018-000013 // CNNVD: CNNVD-201802-873

EXTERNAL IDS

db:NVDid:CVE-2018-6218

Trust: 2.8

db:JVNid:JVN28865183

Trust: 2.8

db:BIDid:103096

Trust: 2.0

db:JVNDBid:JVNDB-2018-000013

Trust: 0.8

db:CNNVDid:CNNVD-201802-873

Trust: 0.7

db:VULHUBid:VHN-136250

Trust: 0.1

sources: VULHUB: VHN-136250 // BID: 103096 // JVNDB: JVNDB-2018-000013 // CNNVD: CNNVD-201802-873 // NVD: CVE-2018-6218

REFERENCES

url:https://success.trendmicro.com/solution/1119326

Trust: 2.0

url:https://jvn.jp/jp/jvn28865183/

Trust: 2.0

url:https://success.trendmicro.com/jp/solution/1119348

Trust: 2.0

url:http://www.securityfocus.com/bid/103096

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-6218

Trust: 0.8

url:https://www.ipa.go.jp/security/ciadr/vul/20180215-jvn.html

Trust: 0.8

url:http://jvn.jp/en/jp/jvn28865183/index.html

Trust: 0.8

url:https://jvn.jp/en/ta/jvnta91240916/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-6218

Trust: 0.8

url:http://www.trend.com

Trust: 0.3

sources: VULHUB: VHN-136250 // BID: 103096 // JVNDB: JVNDB-2018-000013 // CNNVD: CNNVD-201802-873 // NVD: CVE-2018-6218

CREDITS

Hidenori Ohta of Mitsubishi Electric Information Systems Corporation.

Trust: 0.3

sources: BID: 103096

SOURCES

db:VULHUBid:VHN-136250
db:BIDid:103096
db:JVNDBid:JVNDB-2018-000013
db:CNNVDid:CNNVD-201802-873
db:NVDid:CVE-2018-6218

LAST UPDATE DATE

2024-08-14T15:29:01.966000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-136250date:2018-08-30T00:00:00
db:BIDid:103096date:2018-02-14T00:00:00
db:JVNDBid:JVNDB-2018-000013date:2018-04-11T00:00:00
db:CNNVDid:CNNVD-201802-873date:2021-08-10T00:00:00
db:NVDid:CVE-2018-6218date:2021-09-13T12:22:39.027

SOURCES RELEASE DATE

db:VULHUBid:VHN-136250date:2018-02-16T00:00:00
db:BIDid:103096date:2018-02-14T00:00:00
db:JVNDBid:JVNDB-2018-000013date:2018-02-15T00:00:00
db:CNNVDid:CNNVD-201802-873date:2018-02-16T00:00:00
db:NVDid:CVE-2018-6218date:2018-02-16T22:29:00.413