CVE-2019-11230Link Following in Antivirus

CWE-59Link Following3 documents3 sources
Severity
4.4MEDIUMNVD
EPSS
0.1%
top 70.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 18
Latest updateMay 24

Description

In Avast Antivirus before 19.4, a local administrator can trick the product into renaming arbitrary files by replacing the Logs\Update.log file with a symlink. The next time the product attempts to write to the log file, the target of the symlink is renamed. This defect can be exploited to rename a critical product file (e.g., AvastSvc.exe), causing the product to fail to start on the next system restart.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:NExploitability: 0.8 | Impact: 3.6

Affected Packages1 packages

NVDavast/antivirus< 19.4

🔴Vulnerability Details

2
GHSA
GHSA-32p2-rghv-w56x: In Avast Antivirus before 192022-05-24
CVEList
CVE-2019-11230: In Avast Antivirus before 192019-07-18
CVE-2019-11230 — Link Following in Avast Antivirus | cvebase