First published: Thu Apr 27 2017(Updated: )
In Avast Antivirus before v17, using the LPC interface API exposed by the AvastSVC.exe Windows service, it is possible to launch predefined binaries, or replace or delete arbitrary files. This vulnerability is exploitable by any unprivileged user when Avast Self-Defense is disabled. It is also exploitable in conjunction with CVE-2017-8308 when Avast Self-Defense is enabled. The vulnerability allows for Denial of Service attacks and hiding traces of a possible attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Avast Antivirus | <=12.3.2279 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8307 has a high severity rating due to its potential for unauthorized file manipulation by unprivileged users.
To mitigate CVE-2017-8307, ensure that Avast Self-Defense is enabled and consider updating to a version later than 12.3.2279.
CVE-2017-8307 affects Avast Antivirus versions prior to v17.
CVE-2017-8307 requires local access, as it can only be exploited by unprivileged users on systems where Avast Self-Defense is disabled.
CVE-2017-8307 is a file manipulation vulnerability that allows unauthorized access to files via the LPC interface API.