In Avast Antivirus before 19.4, a local administrator can trick the product into renaming arbitrary files by replacing the Logs\Update.log file with a symlink. The next time the product attempts to write to the log file, the target of the symlink is renamed. This defect can be exploited to rename a critical product file (e.g., AvastSvc.exe), causing the product to fail to start on the next system restart.
References
Link | Resource |
---|---|
http://www.mcerlane.co.uk/CVE-2019-11230/ | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/109344 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-18T16:50:43
Updated: 2019-07-24T07:06:03
Reserved: 2019-04-14T00:00:00
Link: CVE-2019-11230
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-18T17:15:11.880
Modified: 2019-07-24T15:33:25.357
Link: CVE-2019-11230
JSON object: View
Redhat Information
No data.
CWE