You’re offline. This is a read only version of the page.
Worried about online scams? Trend Micro ScamCheck's offers real-time assessments of phone numbers, URLs, emails, text messages, and screenshots to help you stay protected. Learn more about how to safeguard yourself from fraud.
Besorgt über Online-Betrug? Trend Micro ScamCheck bietet Echtzeitbewertungen von Telefonnummern, URLs, E-Mails, Textnachrichten und Screenshots, um Sie zu schützen. Erfahren Sie mehr darüber, wie Sie sich vor Betrug schützen können.
Vous craignez les arnaques en ligne ? Trend Micro ScamCheck analyse en temps réel les numéros de téléphone, URL, e-mails, messages texte et captures d'écran pour vous protéger. Découvrez comment vous prémunir contre la fraude.
Risau tentang penipuan dalam talian? Trend Micro ScamCheck menawarkan penilaian masa nyata untuk nombor telefon, URL, e-mel, mesej teks, dan tangkapan skrin bagi melindungi anda. Ketahui lebih lanjut tentang cara melindungi diri anda daripada penipuan.
Khawatir tentang penipuan online? Trend Micro ScamCheck menawarkan penilaian real-time terhadap nomor telepon, URL, email, pesan teks, dan tangkapan layar untuk melindungi Anda. Pelajari lebih lanjut tentang cara melindungi diri Anda dari penipuan.
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Trend Micro has released an update to resolve this issue and customers should receive the update automatically as long as they are connected to the Internet.
Product Versions
Update Build
Platform
All 2016 Trend Micro Security Products (version 10)
10.0.1288
Windows OS
Vulnerability Details
This update resolves a vulnerability in one of Trend Micro Security Network Content Inspection drivers. When an attacker triggers a null pointer dereference it would produce a driver fault and BSOD. The resulting exceptions can be used to elevate privileges or leak the kernel debugging information. Such information will be valuable in planning subsequent attacks.
Trend Micro has not received any reports and is not aware of any actual attacks against the affected products related to the Kernel Driver Null Pointer Deference vulnerability at this time.
Mitigating Factors
None identified. Customers are advised to ensure they always have the latest version of the program.
Acknowledgement
Trend Micro would like to thank the following individuals for responsibly reporting this issue and working with Trend Micro to help protect our customers:
Enrique Elias Nissim
Jaanus Kp of Clarified Security working with Trend Micro's Zero Day Initiative
@bee13oy of CloverSec Labs working with Trend Micro's Zero Day Initiative
Kasif Dekel & Gal Elbaz of Check PointSecurity Research Team