Page 7 of 65 results (0.003 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to achieve Arbitrary File Deletion from Avast Program Path via RPC, when Self Defense is Enabled. Se detectó un problema en Avast Antivirus versiones anteriores a 20. El endpoint de aswTask RPC para la biblioteca TaskEx en el Avast Service (AvastSvc.exe) permite a atacantes lograr una Eliminación de Archivos Arbitrarios de Avast Program Path por medio de una RPC, cuando Self Defense está Habilitada. • https://forum.avast.com/index.php?topic=232420.0 https://forum.avast.com/index.php?topic=232423.0 https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered in Avast Antivirus before 20. An Arbitrary Memory Address Overwrite vulnerability in the aswAvLog Log Library results in Denial of Service of the Avast Service (AvastSvc.exe). Se detectó un problema en Avast Antivirus versiones anteriores a 20. Una vulnerabilidad de Sobrescritura de Dirección de Memoria Arbitraria en la aswAvLog Log Library que resulta en una Denegación de Servicio del Avast Service (AvastSvc.exe). • https://forum.avast.com/index.php?topic=232420.0 https://forum.avast.com/index.php?topic=232423.0 https://github.com/umarfarook882/Avast_Multiple_Vulnerability_Disclosure/blob/master/README.md • CWE-787: Out-of-bounds Write •

CVSS: 7.4EPSS: 0%CPEs: 2EXPL: 0

Avast AntiTrack before 1.5.1.172 and AVG Antitrack before 2.0.0.178 proxies traffic to HTTPS sites but does not validate certificates, and thus a man-in-the-middle can host a malicious website using a self-signed certificate. No special action necessary by the victim using AntiTrack with "Allow filtering of HTTPS traffic for tracking detection" enabled. (This is the default configuration.) Avast AntiTrack versiones anteriores a 1.5.1.172 y AVG Antitrack versiones anteriores a 2.0.0.178, envían tráfico hacia los sitios HTTPS pero no se comprueban los certificados, por lo que un ataque de tipo man-in-the-middle puede alojar un sitio web malicioso usando un certificado autofirmado. Una víctima no necesita ninguna acción especial usando AntiTrack con "Allow filtering of HTTPS traffic for tracking detection" habilitado. • https://www.avast.com/hacker-hall-of-fame/en/researcher-david-eade-reports-antitrack-bug-to-avast https://www.davideade.com/2020/03/avast-antitrack.html • CWE-295: Improper Certificate Validation •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

The Avast AV parsing engine allows virus-detection bypass via a crafted ZIP archive. This affects versions before 12 definitions 200114-0 of Antivirus Pro, Antivirus Pro Plus, and Antivirus for Linux. El motor de análisis de Avast AV permite la detección de virus por medio de un archivo ZIP diseñado. Esto afecta a las versiones anteriores a 12 definiciones de 200114-0 de Antivirus Pro, Antivirus Pro Plus y Antivirus para Linux. • https://blog.zoller.lu/p/tzo-23-2020-avast-generic-archive.html https://seclists.org/fulldisclosure/2020/Feb/35 • CWE-436: Interpretation Conflict •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the elevated process cleans the ACL of the Update.ini file in %PROGRAMDATA%\Avast Software\Browser\Update\ and sets all privileges to group Everyone. Because any low-privileged user can create, delete, or modify the Update.ini file stored in this location, an attacker with low privileges can create a hard link named Update.ini in this folder, and make it point to a file writable by NT AUTHORITY\SYSTEM. Once AvastBrowserUpdate.exe is triggered by the update check functionality, the DACL is set to a misconfigured value on the crafted Update.ini and, consequently, to the target file that was previously not writable by the low-privileged attacker. • http://packetstormsecurity.com/files/156844/Avast-Secure-Browser-76.0.1659.101-Local-Privilege-Escalation.html http://seclists.org/fulldisclosure/2020/Mar/25 https://www.avast.com/bug-bounty-credits/en/a-tribute-to-our-security-research-community • CWE-863: Incorrect Authorization •