First published: Tue Sep 24 2019(Updated: )
In Total Defense Anti-virus 9.0.0.773, resource acquisition from the untrusted search path C:\ used by caschelp.exe allows local attackers to hijack ccGUIFrm.dll, which leads to code execution. SYSTEM-level code execution can be achieved when the ccSchedulerSVC service runs the affected executable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TotalDefense AntiVirus | =9.0.0.773 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13357 is considered to have a high severity due to its potential to allow code execution at the SYSTEM level.
To mitigate CVE-2019-13357, update Total Defense Anti-virus to a version later than 9.0.0.773.
CVE-2019-13357 enables local attackers to perform DLL hijacking, leading to arbitrary code execution.
The vulnerability involves the caschelp.exe component of Total Defense Anti-virus.
Yes, systems running Total Defense Anti-virus 9.0.0.773 are at risk for exploitation due to CVE-2019-13357.