Avast Pulls Plug on Insecure JavaScript Engine in its Security Software Suite
upstart writes in with an IRC submission for AnonymousCoward:
Avast pulls plug on insecure JavaScript engine in its security software suite:
Avast has disabled a component in its Windows anti-malware suite that posed, ironically enough, a significant security risk.
The software maker switched off the JavaScript interpreter in its toolkit after Google Project Zero's Tavis Ormandy, and his colleagues, alerted the developer to design flaws in the code.
According to Avast, Ormandy potentially found a remote-code execution vulnerability in the software, the details of which were not publicly shared. Five days later, the Googler released a shell for poking around in Avast's JavaScript engine for anyone interested in assessing the antivirus suite. He also revealed that if miscreants were able to exploit any holes in Avast's JS engine on a victim's computer, they would be able to run malware on that PC with system-admin-level privileges.
[...]"Despite being highly privileged and processing untrusted input by design, it is unsandboxed and has poor mitigation coverage," Ormandy explained earlier this week. It should be noted Ormandy did not disclose any specific bugs.
A couple days after the analysis tool was released, the vendor opted to do away with the emulator entirely. It does not believe the removal will significantly impact the suite's ability to detect malware. The swift action was applauded by Ormandy.
Read more of this story at SoylentNews.