Vulnerabilities > Totaldefense

DATE CVE VULNERABILITY TITLE RISK
2019-10-31 CVE-2019-18645 Link Following vulnerability in Totaldefense Anti-Virus 11.5.2.28
The quarantine restoration function in Total Defense Anti-virus 11.5.2.28 is vulnerable to symbolic link attacks, allowing files to be written to privileged directories.
local
low complexity
totaldefense CWE-59
2.1
2019-10-31 CVE-2019-18644 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Totaldefense Anti-Virus 11.5.2.28
The malware scan function in Total Defense Anti-virus 11.5.2.28 is vulnerable to a TOCTOU bug; consequently, symbolic link attacks allow privileged files to be deleted.
5.8
2019-09-24 CVE-2019-13357 Untrusted Search Path vulnerability in Totaldefense Anti-Virus 9.0.0.773
In Total Defense Anti-virus 9.0.0.773, resource acquisition from the untrusted search path C:\ used by caschelp.exe allows local attackers to hijack ccGUIFrm.dll, which leads to code execution.
local
low complexity
totaldefense CWE-426
4.6
2019-09-24 CVE-2019-13356 Incorrect Permission Assignment for Critical Resource vulnerability in Totaldefense Anti-Virus 9.0.0.773
In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\bd\TDUpdate2\ used by AMRT.exe allows local attackers to hijack bdcore.dll, which leads to privilege escalation when the AMRT service loads the DLL.
local
low complexity
totaldefense CWE-732
4.6
2019-09-24 CVE-2019-13355 Incorrect Permission Assignment for Critical Resource vulnerability in Totaldefense Anti-Virus 9.0.0.773
In Total Defense Anti-virus 9.0.0.773, insecure access control for the directory %PROGRAMDATA%\TotalDefense\Consumer\ISS\9\ used by ccschedulersvc.exe allows local attackers to hijack dotnetproxy.exe, which leads to privilege escalation when the ccSchedulerSVC service runs the executable.
local
low complexity
totaldefense CWE-732
4.6