In Avast Antivirus before 19.4, a local administrator can trick the product into renaming arbitrary files by replacing the Logs\Update.log file with a symlink. The next time the product attempts to write to the log file, the target of the symlink is renamed. This defect can be exploited to rename a critical product file (e.g., AvastSvc.exe), causing the product to fail to start on the next system restart.
References
Link Resource
http://www.mcerlane.co.uk/CVE-2019-11230/ Exploit Third Party Advisory
http://www.securityfocus.com/bid/109344 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-07-18T16:50:43

Updated: 2019-07-24T07:06:03

Reserved: 2019-04-14T00:00:00


Link: CVE-2019-11230

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-07-18T17:15:11.880

Modified: 2019-07-24T15:33:25.357


Link: CVE-2019-11230

JSON object: View

cve-icon Redhat Information

No data.

CWE