Fortinet Discovers Trend Micro Email Encryption Client DLL Preloading Vulnerability
Fortinet's FortiGuard Labs has discovered a DLL preloading vulnerability in Trend Micro Email Encryption Client.
Trend Micro Email Encryption Client is a commercial tool to keep your email confidential, simplify compliance, and reduce management costs by removing the complexity from encryption. It can send encrypted emails to anyone with identity based encryption, lower IT costs with hosted key service and ensure access to email with 24x7 key recovery.
Trend Micro Email Encryption Client is susceptible to a DLL preloading vulnerability. The issue occurs when the application looks to load a DLL for execution and an attacker provides a malicious DLL to use instead. The application generally follows a specific search path to locate the DLL. The vulnerability can be exploited by a simple file write (or potentially an over-write) which results in a foreign DLL running under the context of the application.
Users should apply the solution provided by Trend Micro.
Fortinet reported the vulnerability to Trend Micro on Jun. 6, 2017.
Trend Micro confirmed the vulnerability on Sep. 12, 2017.
Trend Micro patched the vulnerability on Nov. 16, 2017.
This vulnerability was discovered by Kushal Arvind Shah of Fortinet's FortiGuard Labs.