CVE-2019-11230 | Date: (C)2019-07-19 (M)2023-12-22 |
In Avast Antivirus before 19.4, a local administrator can trick the product into renaming arbitrary files by replacing the LogsUpdate.log file with a symlink. The next time the product attempts to write to the log file, the target of the symlink is renamed. This defect can be exploited to rename a critical product file (e.g., AvastSvc.exe), causing the product to fail to start on the next system restart.
CVSS Score and Metrics +CVSS Score and Metrics -CVSS V3 Severity: | CVSS V2 Severity: |
CVSS Score : 4.4 | CVSS Score : 3.6 |
Exploit Score: 0.8 | Exploit Score: 3.9 |
Impact Score: 3.6 | Impact Score: 4.9 |
|
CVSS V3 Metrics: | CVSS V2 Metrics: |
Attack Vector: LOCAL | Access Vector: LOCAL |
Attack Complexity: LOW | Access Complexity: LOW |
Privileges Required: HIGH | Authentication: NONE |
User Interaction: NONE | Confidentiality: NONE |
Scope: UNCHANGED | Integrity: PARTIAL |
Confidentiality: NONE | Availability: PARTIAL |
Integrity: HIGH | |
Availability: NONE | |
| |