{"id":13700,"date":"2020-03-16T11:57:22","date_gmt":"2020-03-16T10:57:22","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=13700"},"modified":"2024-10-05T21:09:35","modified_gmt":"2024-10-05T19:09:35","slug":"sicherheit-avast-deaktiviert-javascript-in-av-programm","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/03\/16\/sicherheit-avast-deaktiviert-javascript-in-av-programm\/","title":{"rendered":"Security: AVAST disables JavaScript in AV program"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/web.archive.org\/web\/20200806075703\/https:\/\/www.borncity.com\/blog\/2020\/03\/16\/sicherheit-avast-deaktiviert-javascript-in-av-programm\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]A serious vulnerability in its antivirus solutions has forced the security provider AVAST to disable JavaScript in its products for security reasons. Here are a few details.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg01.met.vgwort.de\/na\/d637dfa0ee5746dca6687b3ee721b49f\" width=\"1\" height=\"1\">AVAST is used by some people as a security and virus protection solution on Windows. However, such supposed security products often bring weaknesses to your system. German blog reader Nobody already pointed this out in this <a href=\"https:\/\/www.borncity.com\/blog\/2020\/01\/30\/avast-nach-datenskandal-aus-fr-jumpshot-verkndet\/#comment-86690\" target=\"_blank\" rel=\"noopener noreferrer\">comment<\/a> at the end of last week (thank you). <\/p>\n<h2>Project Zero exposes vulnerability<\/h2>\n<p>Antivirus solutions use a JavaScript interpreter to execute malicious code in a sandbox. Then the behavior of the code is monitored for indications of malicious code. This is nothing unknown, and security experts know that this is a potential attack point for malicious software. If there is a vulnerability in the sandbox, the malware can escape from the sandbox or play dead if the sandbox is detected. <\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Wow &#8211; Avast decided to disable their JavaScript interpreter globally!<\/p>\n<p>The vulnerability report they mention wasn't just me, it was a Project Zero collaboration with <a href=\"https:\/\/twitter.com\/natashenka?ref_src=twsrc%5Etfw\">@natashenka<\/a> <\/p>\n<p>I think this is the right decision, it was a *lot* of attack surface. <a href=\"https:\/\/t.co\/iFyry17HD0\">https:\/\/t.co\/iFyry17HD0<\/a><\/p>\n<p>\u2014 Tavis Ormandy (@taviso) <a href=\"https:\/\/twitter.com\/taviso\/status\/1237745571009409029?ref_src=twsrc%5Etfw\">March 11, 2020<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/p>\n<p>Google security researcher Tavis Ormandy from Project Zero pointed out a fat problem in the AVAST JavaScript interpreter or anti-virus engine on <a href=\"https:\/\/github.com\/taviso\/avscript\" target=\"_blank\" rel=\"noopener noreferrer\">Github<\/a> on March 11, 2020. This is because he discovered a vulnerability in<em> AvastSvc.exe<\/em> during the analysis. This is the Avast antivirus process running with the SYSTEM permission level.<\/p>\n<p>The <em>AvastSvc.exe <\/em>service loads the low-level antivirus engine and analyzes untrusted data received from sources such as the file system minifilter or intercepted network traffic. Although the service is highly privileged and processes untrusted input, it does not run in a sandbox and, according to Ormandy's analysis, has virtually no mitigation measures implemented. Furthermore, the product comes with its own JavaScript interpreter. All vulnerabilities in this construct are critical and easily accessible to remote attackers. <\/p>\n<p>Ormandy did not find a concrete weakness in this construct. But he points out in his GitHut article that debugging can be extremely difficult in this process. He has also documented for other security researchers how to attack this JavaScript emulator to find vulnerabilities. <\/p>\n<h2>AVAST disables JavaScript<\/h2>\n<p>So in principle AVAST has built in something like a predetermined 'weak point' that only needs to be attacked. So it was only a matter of time before an exploit would show up. So the antivirus vendor reports in the above tweet that it had been aware of the issue since March 4, 2020. After Ormandy published his GitHub post with a tool to analyze the emulator on March 9, 2020, they decide to disabled the emulato, to protect hundreds of millions of users.&nbsp; According to AVAST, this does not affect the functionality of the antivirus solution. <\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/01\/28\/leak-revealed-avast-user-data-was-sold\/\">Leak revealed: Avast user data was sold<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/01\/30\/avast-nach-datenskandal-aus-fr-jumpshot-verkndet\/\">AVAST: Jumpshot will be closed after privacy scandal<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2019\/12\/04\/mozilla-removed-firefox-addons-from-avg-avast\/\">Mozilla removed Firefox Addons from AVG\/AVAST<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2019\/12\/22\/firefox-addons-from-avg-avast-back-in-store\/\">Firefox Addons from AVG\/AVAST back in store<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2019\/11\/25\/windows-10-v190x-avast-avg-as-upgrade-blocker\/\">Windows 10 V190x: Avast\/AVG as Upgrade Blocker<\/a><br \/>XSS Vulnerability in AVAST Antivirus<br \/><a href=\"https:\/\/borncity.com\/win\/2019\/10\/22\/abbis-avast-werhrt-cyber-angriff-auf-netzwerk-ab\/\">Abbis: AVAST fights off a cyber-attack attempt on its network<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2019\/04\/12\/avast-and-avira-confirms-april-2019-update-issues\/\">AVAST and Avira confirms April 2019 Update issues<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2019\/02\/05\/firefox-65-for-windows-issues-with-avast-avg-antivirus\/\">Firefox 65 for Windows: Issues with AVAST\/AVG Antivirus<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/08\/02\/avast-ccleaner-5-45-and-the-telemetry-thing\/\">AVAST CCleaner 5.45 and the telemetry thing<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]A serious vulnerability in its antivirus solutions has forced the security provider AVAST to disable JavaScript in its products for security reasons. Here are a few details.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,2],"tags":[646,87,69,194],"class_list":["post-13700","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-windows","tag-antivirus","tag-avast","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=13700"}],"version-history":[{"count":2,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13700\/revisions"}],"predecessor-version":[{"id":35811,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13700\/revisions\/35811"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=13700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=13700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=13700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}