Thursday, 13 July 2017

On 01:43 by admin in    No comments
A vulnerability was found in AVG Antivirus on MacOS (the affected version is unknown) and classified as critical. Affected by this issue is an unknown function of the component Scan Engine. The manipulation as part of a DMG File leads to a privilege escalation vulnerability (bypass). Using CWE to declare the problem leads to CWE-269. Impacted is confidentiality, integrity, and availability.

The weakness was released 07/12/2017. This vulnerability is handled as CVE-2017-9977 since 06/26/2017. The attack may be launched remotely. No form of authentication is required for exploitation. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $5k-$25k (estimation calculated on 07/12/2017).

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

CVSSv3

VulDB Base Score7.3
VulDB Temp Score7.3
VulDB VectorCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X
VulDB Reliability: High

CVSSv2

VectorComplexityAuthenticationConfidentialityIntegrityAvailability
LocalHighMultipleNoneNoneNone
AdjacentMediumSinglePartialPartialPartial
NetworkLowNoneCompleteCompleteComplete
VulDB Base Score6.8 (CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
VulDB Temp Score6.8 (CVSS2#E:ND/RL:ND/RC:ND)
VulDB Reliability: High


CPE
  • cpe:/a:avg:antivirus

Exploiting

Class: Privilege escalation / Bypass (CWE-269)
Local: No
Remote: Yes

Availability: No

Price Prediction: steady
Current Price Estimation

0-Day$0-$5k$5k-$25k$25k-$100k$100k-$500k
Today$0-$5k$5k-$25k$25k-$100k$100k-$500k
Countermeasures

Recommended: no mitigation known
0-Day Time: 0 days since found

Timeline

06/26/2017   CVE assigned
07/12/2017  +16 days Advisory disclosed
07/12/2017  +0 days VulDB entry created
07/12/2017  +0 days VulDB last update

Sources

CVE: CVE-2017-9977 (mitre.org) (nvd.nist.org) (cvedetails.com)

0 comments:

Post a comment