Release Date: March 22, 2017
Trend Micro Identifier(s): 2016-0534
CVE Identifier: CVE-2017-5565
Platform(s): Windows
Trend Micro has released a hot fix for the Trend Micro Security 2017 family of consumer-focused products. This hot fix resolves a potential security issue that could be triggered when a malicious user tries to inject a DLL into a Trend Micro Security process by taking advantage of Microsoft's Standard Application Verifier Provider DLL.
This issue is also being referred to as "DoubleAgent" in various news articles and blogs.
Affected Version(s)
Product | Affected Version(s) | Platform | Language(s) |
---|---|---|---|
Premium Security 2017 | Version 11.1.1005 and below | Windows | English |
Maximum Security 2017 | Version 11.1.1005 and below | Windows | English |
Internet Security 2017 | Version 11.1.1005 and below | Windows | English |
Antivirus+ Security 2017 | Version 11.1.1005 and below | Windows | English |
Trend Micro is investigating whether or not any other product may be affected and will update this bulletin accordingly if necessary with additional information.
Solution
Trend Micro has released the following solutions to address the issue:
Product | Updated version | Notes | Platform | Availability |
---|---|---|---|---|
Trend Micro Security 2017 (all versions) | HF 1403* | Readme | Windows | Now |
*As of March 30, 2017, this update has been uploaded to Trend Micro's ActiveUpdate servers for Trend Micro Security 2017 products. All customers receiving automatic updates will receive this fix within the next several days.
Customers are encouraged to visit Trend Micro’s Download Center to obtain prerequisite software (such as Service Packs) before applying any of the solutions above.
Security Issue Details
This hot fix allows Trend Micro Security to defend itself against a potential Microsoft Windows OS-level security issue that could be triggered if an user with administrative rights registers a specific DLL as a "Verifier DLL" for a Trend Micro Security Process, allowing the DLL to be injected into it upon the next start of the process.
Due to the seriousness of any potential security issue, customers are highly encouraged to apply the latest fixes as soon as possible from both their OS provider as well as application vendors.
Trend Micro has received no reports, nor is currently aware of any actual attacks or exploits against the affected products at this time.
Mitigating Factors
Exploiting these type of security issues generally require that an attacker has access (physical or remote) to a vulnerable machine. In addition to timely application of patches and updated solutions, customers are also advised to review remote access to critical systems and ensure policies and perimeter security is up-to-date.
In addition, a user must have administrative user rights to the target machine in order to try and deliver an exploit using the method above.
However, even though an exploit may require several specific conditions to be met, Trend Micro strongly encourages customers to update to the latest builds as soon as possible.
Acknowledgement
Trend Micro would like to thank the following individuals for responsibly disclosing these issues and working with Trend Micro to help protect our customers:
- Michael Engstler of Cybellum
External Reference(s)
CVE-2017-5565
Trend Micro Blog: Evaluating The Risk Of DoubleAgent