Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:claranova:adaware_antivirus:*:*:*:*:*:*:*:*", "matchCriteriaId": "C39B908A-D4BE-49F4-91B1-EC2C9ED41C98", "versionEndIncluding": "12.7.1055.0", "versionStartIncluding": "12.6.1005.11662", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "Adaware antivirus 12.6.1005.11662 and 12.7.1055.0 has a quarantine flaw that allows privilege escalation. Exploitation uses an NTFS directory junction to restore a malicious DLL from quarantine into the system32 folder."}, {"lang": "es", "value": "Adaware antivirus versiones 12.6.1005.11662 y 12.7.1055.0, presenta un fallo de cuarentena que permite una escalada de privilegios. La explotaci\u00f3n utiliza una uni\u00f3n de directorio NTFS para restaurar una DLL maliciosa desde la cuarentena en la carpeta system32."}], "id": "CVE-2019-18979", "lastModified": "2024-11-21T04:33:55.607", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2020-03-18T21:15:11.993", "references": [{"source": "cve@mitre.org", "url": "https://medium.com/%40kusolwatcharaapanukorn/0-days-adaware-antivirus-quarantine-flaws-allow-privilege-escalation-3d1f3c8214ec"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://medium.com/%40kusolwatcharaapanukorn/0-days-adaware-antivirus-quarantine-flaws-allow-privilege-escalation-3d1f3c8214ec"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}