Experts discovered several flaws in Comodo Antivirus, including a vulnerability that could allow to escape the sandbox and escalate privileges.
The Tenable expert David Wells discovered five flaws in the Comodo Antivirus and Comodo Antivirus Advanced.
Four of the vulnerabilities affect were version 12.0.0.6810 and one the version 11.0.0.6582.
The most severe flaw, tracked as CVE=2019-3969, could be exploited by an attacker with access to the target system to escape the Comodo Antivirus sandbox and escalate privileges to SYSTEM.
“An attacker can bypass this signing check however by changing the client’s process name within it’s PEB (Process Environment Block), or process hollowing a Comodo/Microsoft signed processes with malicious code. This is because CmdAgent’s signature check uses the filename from EnumProcessModules / GetModuleFilename for the COM Client’s PID. Once passing trusted binary check, an attacker can obtain an Instance of IServiceProvider.” reads the post published by Tenable. “With IServiceProvider, the attacker can then query for an interface to SvcRegKey and perform registry writes through the Out-Of-Proc COM server as “NT AUTHORTIY\SYSTEM”, allowing local privilege escalation.”
Another vulnerability, tracked as, CVE-2019-3970, is an arbitrary file write issue that could be’ exploited by an attacker to modify malware definitions and evade detection.
The remaining issue could be exploited by an attacker with access to the target system to trigger a DoS condition in the kernel and other components. All the flaws were rated As “medium” or “low” severity.
Wells published technical details for the sandbox escape/privilege escalation vulnerability in a post published on Medium.
Tenable reported the flaws to Comodo in April, but at the time of writing the vendor has yet to address them.
“At the time of this disclosure, we are not aware of any patches released by Comodo that address these vulnerabilities. We recommend to keep updated on future Comodo Antivirus releases.” concludes Tenable.
Below the timeline for the flaw:
04/17/19 – Tenable discloses to Comodo.
04/29/19 – Tenable follows up, asking if vulnerabilities have been confirmed.
05/07/19 – Comodo confirms some vulnerabilities, waiting to confirm others.
05/20/19 – Tenabe requests status update.
06/04/19 – Tenabe requests status update.
06/04/19 – Comodo provides status update. No planned release date at this time
06/04/19 – Tenable asks for confirmation of vulnerabilities
06/07/19 – Comodo explains LPE vulnerability is partially due to Microsoft’s fault
06/10/19 – Tenable asks what Microsoft’s fault is in this scenario
06/19/19 – Tenable notifies Comodo that we plan to release CVEs for issues
07/08/19 – Tenable asks when Comodo expects fixes for disclosed issues.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.