This security advisory describes one low risk vulnerability.
1) Resource exhaustion
The vulnerability allows a local attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to uncontrolled resource consumption. A local attacker can trigger resource exhaustion, perform a denial of service (DoS) attack and disable vulnerable products.
Install updates from vendor’s website.
Vulnerable software versions
Trend Micro Internet Security:
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.