{
  "data_type": "CVE",
  "data_format": "MITRE",
  "data_version": "4.0",
  "generator": {
    "engine": "Vulnogram 0.0.8"
  },
  "CVE_data_meta": {
    "ID": "CVE-2019-3646",
    "ASSIGNER": "psirt@mcafee.com",
    "DATE_PUBLIC": "",
    "TITLE": "McAfee Total Protection - Free Antivirus Trial: DLL Search Order Hijacking vulnerability",
    "AKA": "",
    "STATE": "PUBLIC"
  },
  "source": {
    "defect": [],
    "advisory": "",
    "discovery": "EXTERNAL"
  },
  "affects": {
    "vendor": {
      "vendor_data": [
        {
          "vendor_name": "McAfee, LLC",
          "product": {
            "product_data": [
              {
                "product_name": "McAfee Total Protection - Free Antivirus Trial",
                "version": {
                  "version_data": [
                    {
                      "version_name": "16.0",
                      "version_affected": "<=",
                      "version_value": "16.0.R18",
                      "platform": ""
                    }
                  ]
                }
              }
            ]
          }
        }
      ]
    }
  },
  "problemtype": {
    "problemtype_data": [
      {
        "description": [
          {
            "lang": "eng",
            "value": "Malicious File Execution (CWE-714, OWASP 2004:A3)"
          }
        ]
      }
    ]
  },
  "description": {
    "description_data": [
      {
        "lang": "eng",
        "value": "DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Free Antivirus Trial 16.0.R18 and earlier allows local users to execute arbitrary code via execution from a compromised folder placed by an attacker with administrator rights."
      }
    ]
  },
  "references": {
    "reference_data": [
      {
        "refsource": "CONFIRM",
        "url": "http://service.mcafee.com/FAQDocument.aspx?&id=TS102968",
        "name": "http://service.mcafee.com/FAQDocument.aspx?&id=TS102968"
      }
    ]
  },
  "configuration": [],
  "impact": {
    "cvss": {
      "version": "3.1",
      "attackVector": "LOCAL",
      "attackComplexity": "LOW",
      "privilegesRequired": "HIGH",
      "userInteraction": "REQUIRED",
      "scope": "CHANGED",
      "confidentialityImpact": "LOW",
      "integrityImpact": "HIGH",
      "availabilityImpact": "LOW",
      "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:L",
      "baseScore": 6.9,
      "baseSeverity": "MEDIUM"
    }
  },
  "exploit": [],
  "work_around": [],
  "solution": [],
  "credit": []
}
