Search

Vulnerability in AVG Internet Security (CVE-2024-6510)

Search

Vulnerability in AVG Internet Security (CVE-2024-6510)

AVG Internet Security is an antivirus software marketed to consumers.

CVE-2024-6510: Local Privilege Escalation

Local privilege escalation in AVG Internet Security v24 on Windows allows a local unprivileged user to escalate privileges to SYSTEM via COM hijacking.

This was possible by using COM hijacking to execute code in the context of a trusted front-end process. The trust between the front end and the back end was then abused to load a DLL into a process running as SYSTEM, allowing an attacker to execute code as SYSTEM.

For CVE assignment we tried contacting AVG and security@nortonlifelock.com after the fixed release but got no response.

The vulnerability was acknowledged and fixed by AVG within three months.

CVSS Score
7.8 (CVSS v3) 

CVSS Vector String
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Affected Version
Versions < 24.1

Fixed Version
24.1

Credits
Kolja Grassmann

Timeline

Do you want to protect your systems? Feel free to get in touch with us.

Vulnerability in Overwolf (CVE-2024-7834)

Search

Vulnerability in Overwolf (CVE-2024-7834)

Overwolf is a software that is used for managing mods of games with 45 million active users every month.

CVE: CVE-2024-7834: Local Privilege Escalation

A local privilege escalation is caused by Overwolf loading and executing certain dynamic link library files from a user-writeable folder in SYSTEM context on launch. This allows an attacker with unprivileged access to the system to run arbitrary code with SYSTEM privileges by placing a malicious .dll file in the respective location.

The vulnerability was acknowledged and fixed by Overwolf within 3 weeks. We want to thank Overwolf for their exemplary reaction to the vulnerability report.

CVSS Score
7.8 (CVSS v3) 

CVSS Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Version
Overwolf Version <250.1.1

Fixed Version
250.1.1

References
https://nvd.nist.gov/vuln/detail/CVE-2024-7834

Credits
Lukas Bühl

Timeline

Do you want to protect your systems? Feel free to get in touch with us.
Search
Search