First published: Wed Oct 30 2019(Updated: )
The quarantine restoration function in Total Defense Anti-virus 11.5.2.28 is vulnerable to symbolic link attacks, allowing files to be written to privileged directories.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TotalDefense AntiVirus | =11.5.2.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18645 has a high severity rating due to its potential for local privilege escalation.
To fix CVE-2019-18645, update Total Defense Anti-virus to the latest version that addresses this vulnerability.
CVE-2019-18645 involves symbolic link attacks that exploit the quarantine restoration function.
CVE-2019-18645 allows the attacker to write files to privileged directories.
Total Defense Anti-virus version 11.5.2.28 is vulnerable to CVE-2019-18645.