CVE-2019-11230

In Avast Antivirus before 19.4, a local administrator can trick the product into renaming arbitrary files by replacing the Logs\Update.log file with a symlink. The next time the product attempts to write to the log file, the target of the symlink is renamed. This defect can be exploited to rename a critical product file (e.g., AvastSvc.exe), causing the product to fail to start on the next system restart.
References
Link Resource
http://www.mcerlane.co.uk/CVE-2019-11230/ Exploit Third Party Advisory
http://www.securityfocus.com/bid/109344 Third Party Advisory
http://www.mcerlane.co.uk/CVE-2019-11230/ Exploit Third Party Advisory
http://www.securityfocus.com/bid/109344 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:20

Type Values Removed Values Added
References () http://www.mcerlane.co.uk/CVE-2019-11230/ - Exploit, Third Party Advisory () http://www.mcerlane.co.uk/CVE-2019-11230/ - Exploit, Third Party Advisory
References () http://www.securityfocus.com/bid/109344 - Third Party Advisory () http://www.securityfocus.com/bid/109344 - Third Party Advisory

Information

Published : 2019-07-18 17:15

Updated : 2024-11-21 04:20


NVD link : CVE-2019-11230

Mitre link : CVE-2019-11230

CVE.ORG link : CVE-2019-11230


JSON object : View

Products Affected

avast

  • antivirus
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')