Avast pulls plug on insecure JavaScript engine in its security software suite

Code interpreter ran with admin-level access, not sand-boxed, potentially open to remote-code execution

Got Tips? 6 Reg comments

Avast has disabled a component in its Windows anti-malware suite that posed, ironically enough, a significant security risk.

The software maker switched off the JavaScript interpreter in its toolkit after Google Project Zero's Tavis Ormandy, and his colleagues, alerted the developer to design flaws in the code.

According to Avast, Ormandy potentially found a remote-code execution vulnerability in the software, the details of which were not publicly shared. Five days later, the Googler released a shell for poking around in Avast's JavaScript engine for anyone interested in assessing the antivirus suite. He also revealed that if miscreants were able to exploit any holes in Avast's JS engine on a victim's computer, they would be able to run malware on that PC with system-admin-level privileges.

"Despite being highly privileged and processing untrusted input by design, it is unsandboxed and has poor mitigation coverage," Ormandy explained earlier this week. It should be noted Ormandy did not disclose any specific bugs.

A couple days after the analysis tool was released, the vendor opted to do away with the emulator entirely. It does not believe the removal will significantly impact the suite's ability to detect malware. The swift action was applauded by Ormandy.

Praise from the security community has been hard for Avast to come by lately. Earlier this week, the vendor took heat after it was revealed its AntiTrack tool contained security blunders that could have been exploited by man-in-the-middle snoopers to eavesdrop on supposedly secure website connections. ®

Sponsored: Ransomware has gone nuclear

SUBSCRIBE TO OUR WEEKLY TECH NEWSLETTER


Biting the hand that feeds IT © 1998–2020