Skip to main content

Another flaw discovered in a security software product — this time it’s Avast

workplace engagement mobility avast offices logo sign hq headquarters
Image used with permission by copyright holder
Dangerous flaws have been discovered in the Avast SafeZone browser by antivirus provider Avast, making it the next in a long line of security companies recently that have had vulnerabilities found in their products.

Avast SafeZone, also known as Avastium, is based on the open source Chromium browser and comes with Avast’s subscription to its antivirus software.

Last December, Google Project Zero security researcher Tavis Ormandy notified the company of flaws he found in the browser that could allow an attacker to access stored passwords and local files. He made his notification public this week.

According to Ormandy, a user can fall prey to someone accessing their browser if they click on a malicious website set up by the attacker. Ormandy created a proof of concept attack that could exploit someone’s C:/ drive and access files. He also discovered that Avast’s browser had removed a “critical security check” from Chromium that would help in preventing these kinds of attacks.

“Putting this all together, if an Avast user using *any* Web browser visits an attacker controlled URL, he can launch Avastium and take complete control of it; reading files, cookies, passwords, everything,” said Ormandy. “He can even take control of authenticated sessions and read email, interact with online banking, etc.”

Avast published a patch for the vulnerability this week after Ormandy gave a 90-day period before going public.

Ormandy has been busy of late discovering holes and bugs in security software. This week he went public with flaws in Comodo’s browser, which is also based on Chromium while before that he published research into Malwarebytes that showed it was susceptible to man in the middle attacks.

Several antivirus and security vendors have come under scrutiny in the last few weeks for flaws in their software. Kaspersky Lab, McAfee, and AVG all had flaws discovered in their software recently.

Jonathan Keane
Former Digital Trends Contributor
Jonathan is a freelance technology journalist living in Dublin, Ireland. He's previously written for publications and sites…
A dangerous new jailbreak for AI chatbots was just discovered
the side of a Microsoft building

Microsoft has released more details about a troubling new generative AI jailbreak technique it has discovered, called "Skeleton Key." Using this prompt injection method, malicious users can effectively bypass a chatbot's safety guardrails, the security features that keeps ChatGPT from going full Taye.

Skeleton Key is an example of a prompt injection or prompt engineering attack. It's a multi-turn strategy designed to essentially convince an AI model to ignore its ingrained safety guardrails, "[causing] the system to violate its operators’ policies, make decisions unduly influenced by a user, or execute malicious instructions," Mark Russinovich, CTO of Microsoft Azure, wrote in the announcement.

Read more