CVE-2024-5102Improper Validation of Specified Quantity in Input in Antivirus

Severity
7.3HIGHNVD
EPSS
0.1%
top 71.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 10

Description

A sym-linked file accessed via the repair function in Avast Antivirus troubleshooting -> repair) feature, which attempts to delete a file in the current user's AppData directory as NT AUTHORITY\SYSTEM. A low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could

CVSS vector

CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Affected Packages2 packages

NVDavast/antivirus< 24.2
CVEListV5avast/antivirus24.2

🔴Vulnerability Details

2
CVEList
Elevation of Privelage via symlinked file in Avast Antivirus2024-06-10
GHSA
GHSA-75r7-wf67-87f9: A sym-linked file accessed via the repair function in Avast Antivirus troubleshooting -> repair) feature, which attempts to delete a file in the curre2024-06-10

💬Community

23
Bugzilla
CVE-2024-36921 kernel: wifi: iwlwifi: mvm: guard against invalid STA ID on removal2024-06-03
Bugzilla
CVE-2023-52777 kernel: wifi: ath11k: fix gtk offload status event locking2024-05-22
Bugzilla
CVE-2021-47408 kernel: netfilter: conntrack: serialize hash resizes and cleanups2024-05-22
Bugzilla
CVE-2023-52756 kernel: pwm: Fix double shift bug2024-05-22
Bugzilla
CVE-2023-52791 kernel: i2c: core: Run atomic i2c xfer when !preemptible2024-05-22
CVE-2024-5102 — Avast Antivirus vulnerability | cvebase