Content-Length: 252392 | pFad | http://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-45339

D0 Vulnerability-Disclosures/CVE-2021-45339 at main · the-deniss/Vulnerability-Disclosures · GitHub
Skip to content

Latest commit

 

History

History

CVE-2021-45339

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

CVE-2021-45339

Description

Avast's self-defense driver (aswSP.sys) implements wrong logic to determine "is process trusted or not". This logic is based only on path to image from which process is created - if image's binary resides in product directory, then process is trusted, else untrusted. Therefore, malicious code can hollow product's binary (e.g. AvastUI.exe via Import Table infection in PoC) and act as trusted application.

Impact

Avast Antivirus’ self-defense bypass.

Steps to reproduce

  1. Create child whitelisted process (e.g. "C:\Program Files\AVAST Software\Avast\AvastUI.exe") in a suspended state;
  2. Write own malicious code into child process (via hollowing or any other technique);
  3. Resume child process and enjoy privileges of trusted self-defensed process!

Resolution

This issue fixed since Avast 20.4.

Disclosure Timeline

25-03-2020 Initial report sent to Avast.

26-03-2020 Initial response from Avast stating they’re being reviewed it.

23-04-2020 Avast triaged the issue reported as a valid issue and is starting work on a fix.

03-06-2020 Avast released patched version of product.

References

CVE-2021-45339

Avast Hall of Fame









ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://github.com/the-deniss/Vulnerability-Disclosures/tree/main/CVE-2021-45339

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy