CVE-2019-16913
https://notcve.org/view.php?id=CVE-2019-16913
PC Protect Antivirus v4.14.31 installs by default to %PROGRAMFILES(X86)%\PCProtect with very weak folder permissions, granting any user full permission "Everyone: (F)" to the contents of the directory and its subfolders. In addition, the program installs a service called SecurityService that runs as LocalSystem. This allows any user to escalate privileges to "NT AUTHORITY\SYSTEM" by substituting the service's binary with a Trojan horse. PC Protect Antivirus versión v4.14.31, se instala por defecto en %PROGRAMFILES(X86)%\PCProtect con permisos de carpeta muy débiles, otorgando a cualquier usuario permiso completo "Everyone: (F)" para el contenido del directorio y sus subcarpetas. Además, el programa instala un servicio llamado SecurityService que es ejecutado como LocalSystem. • https://flipflopsecurity.wordpress.com/2019/10/07/pc-protect-v4-14-31-privilege-esclation • CWE-276: Incorrect Default Permissions •
CVE-2018-17776 – PCProtect 4.8.35 - Privilege Escalation
https://notcve.org/view.php?id=CVE-2018-17776
PCProtect Anti-Virus v4.8.35 has "Everyone: (F)" permission for %PROGRAMFILES(X86)%\PCProtect, which allows local users to gain privileges by replacing an executable file with a Trojan horse. PCProtect Anti-Virus v4.8.35 tiene el permiso "Everyone: (F)" para %PROGRAMFILES(X86)%\PCProtect, lo que permite que usuarios locales obtengan privilegios reemplazando un archivo ejecutable con un troyano. • https://www.exploit-db.com/exploits/45503 https://packetstormsecurity.com/files/149581/PCProtect-4-8.35-Privilege-Escalation.html • CWE-732: Incorrect Permission Assignment for Critical Resource •