A sym-linked file accessed via the repair function in Avast Antivirus <24.2 on Windows may allow user to elevate privilege to delete arbitrary files or run processes as NT AUTHORITY\SYSTEM. The vulnerability exists within the "Repair" (settings -> troubleshooting -> repair) feature, which attempts to delete a file in the current user's AppData directory as NT AUTHORITY\SYSTEM. A low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could be used to launch a privileged shell instance.
This issue affects Avast Antivirus prior to 24.2.
References
Link | Resource |
---|---|
https://support.norton.com/sp/static/external/tools/security-advisories.html | Not Applicable |
Configurations
Configuration 1 (hide)
AND |
|
History
12 Jun 2024, 18:12
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:avast:antivirus:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
First Time |
Microsoft
Microsoft windows Avast Avast antivirus |
|
CWE | CWE-59 | |
Summary |
|
|
References | () https://support.norton.com/sp/static/external/tools/security-advisories.html - Not Applicable | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.0 |
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-10 17:16
Updated : 2024-06-12 18:12
NVD link : CVE-2024-5102
Mitre link : CVE-2024-5102
CVE.ORG link : CVE-2024-5102
JSON object : View
Products Affected
avast
- antivirus
microsoft
- windows