Lucene search

K
cve[email protected]CVE-2019-11230
HistoryJul 18, 2019 - 5:15 p.m.

CVE-2019-11230

2019-07-1817:15:11
CWE-59
web.nvd.nist.gov
37
avast antivirus
local administrator
symlink vulnerability
cve-2019-11230
nvd
security
file renaming
system restart
avastsvc.exe

3.6 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:P/A:P

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

4.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.9%

In Avast Antivirus before 19.4, a local administrator can trick the product into renaming arbitrary files by replacing the Logs\Update.log file with a symlink. The next time the product attempts to write to the log file, the target of the symlink is renamed. This defect can be exploited to rename a critical product file (e.g., AvastSvc.exe), causing the product to fail to start on the next system restart.

Affected configurations

NVD
Node
avastantivirusRange<19.4
CPENameOperatorVersion
avast:antivirusavast antiviruslt19.4

3.6 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:P/A:P

4.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

4.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.9%

Related for CVE-2019-11230