One of the technicians better safetyGoogle discovered a zero-day exploit in Avast antivirus code.
The investigator is Tavis Ormandy, one of his security technicians Project Google's Zero, the same man who discovered a similar zero-day exploit in Kaspersky's antivirus exactly one month ago.
According to the Ormandy survey, the error occurs when users have access to websites that are protected by HTTPS connections.
Avast's antivirus software uses encrypted traffic to detect potential threats, but according to the researcher they say they use a faulty method to analyze X.509 certificates. This allows attackers (if they know the subject) to run malicious code on the user's computer.
The only prerequisite for running malicious code is accessing a malicious Web site that uses HTTPS, which is not a far-fetched scenario.
Ormandy also released one Vulnerability PoC (PoC) on a Google page.
This is the third antivirus that turns out to contain zero-day vulnerability over the last 30 days.
We have referred to Kaspersky in the past, which included a zero-day bug that allowed an attacker to easily penetrate the victim's computer, gain system privileges, allowing him to carry out all sorts of unrestrained attacks.
The next was FireEye's antivirus, which contained a zero-day that gave unauthorized remote root access to the file system.
Εν τω μεταξύ η Avast ανέφερε ότι έχει κυκλοφορήσει μια ενημέρωμένη version which fixes it problem, και δεν απαιτείται καμία energy by the end user.