Breaking News

DJI Introduces Osmo Mobile 8 with Intelligent Subject Tracking Samsung Launches New P9 Express microSD Express Cards Cloud Streaming officially arrives on PlayStation Portal CORSAIR Launches Second-Generation RMx SHIFT PSUs with Updated Cables and 12V-2×6 GPU Support Zenmuse L3 Launches as DJI's First Long-Range, High-Accuracy Aerial LiDAR System

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Security Flaws Reported In Support Applications Installed  In Lenovo, Toshiba, Dell PCs

Security Flaws Reported In Support Applications Installed In Lenovo, Toshiba, Dell PCs

PC components Dec 7,2015 0

New exploits have been published for flaws in Lenovo Solution Center, Toshiba Service Station and Dell System Detect. CERT said that the the Lenovo Solution Center application contains multiple vulnerabilities that can allow an attacker to execute arbitrary code with SYSTEM privileges.

"We are urgently assessing the vulnerability report and will provide an update and applicable fixes as rapidly as possible, "the Lenovo said.

Launching the Lenovo Solution Center creates a process called LSCTaskService, which runs with SYSTEM privileges. This process runs an HTTP daemon on port 55555, which allows HTTP GET and POST requests to execute methods in the LSCController.dll module. According to CERT, this component includes a number of unsafe methods, including RunInstaller, which is designed to execute arbitrary code from the %APPDATA%\LSC\Local Store directory. This directory is created for each user that logs in to an affected system. The user can write to this directory, regardless of whether the account has administrative privileges on the system. This vulnerability can allow a standard local user to execute arbitrary code with SYSTEM privileges.

Due to a directory traversal vulnerability, Lenovo Solution Center allows an attacker to execute code that resides in an arbitrary location on the drive where user profile directories exist. If an attacker can place arbitrary code in a predictable location on a vulnerable system, this can allow for arbitrary code execution with SYSTEM privileges.

The LSCTaskService component of Lenovo Solution Center contains a CSRF vulnerability. This vulnerability allows web content hosted by any domain to successfully execute requests using the vulnerable service. The CSRF vulnerability in Lenovo Solution Center allows a malicious or compromised web site to be able to cause code execution with SYSTEM privileges on an affected Lenovo system.

By convincing a user who has launched the Lenovo Solution Center to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with SYSTEM privileges. Additionally, a local user can execute arbitrary code with SYSTEM privileges.

To remove the potential risk posed by this vulnerability, users can uninstall the Lenovo Solution Center application using the add / remove programs function.

Slipstream has also published proof-of-concept exploits for two other, lower-impact, vulnerabilities -- one in the Toshiba Service Station and one in Dell System Detect (DSD), a tool that users are prompted to install when they click the "Detect Product" button on Dell's support website.

The Toshiba Service Station application creates a service called TMachInfo that runs as SYSTEM and receives commands via UDP port 1233 on the local host. One of those commands is called Reg.Read and can be used to read most of the Windows registry with system privileges

The flaw in DSD apparently stems from the way Dell attempted to fix a previous vulnerability. According to slipstream, the company implemented RSA-1024 signatures to authenticate commands, but put them in a place on its website where attackers can obtain them.

These can be used as a crude bypass method for Windows' User Account Control (UAC). In this context, the bypass means that "if DSD isn't elevated, we annoy the user with elevation requests until they click yes," Slipstream said.

Toshiba and Dell have not provided any comment yet.

Tags: Lenovo
Previous Post
Minecraft Coming On Nintendo
Next Post
Amazon Introduces Fire HD 8 Reader’s Edition

Related Posts

  • All New Lenovo ThinkStation PGX

  • Lenovo at CES 2025

  • Leica completes trinity series for the SL-System

  • Lenovo AI-Driven Devices

  • Micron Delivers Crucial LPCAMM2 with LPDDR5X Memory for the New AI-Ready Lenovo ThinkPad P1 Gen 7 Workstation

  • Lenovo at CES 2024

  • Lenovo Unlocks New AI PC Experiences with ThinkPad and IdeaPad Laptops Powered by Intel Core Ultra Processors

  • Available Now – Lenovo ThinkPad X1 Fold

Latest News

DJI Introduces Osmo Mobile 8 with Intelligent Subject Tracking
Drones

DJI Introduces Osmo Mobile 8 with Intelligent Subject Tracking

Samsung Launches New P9 Express microSD Express Cards
Cameras

Samsung Launches New P9 Express microSD Express Cards

Cloud Streaming officially arrives on PlayStation Portal
Gaming

Cloud Streaming officially arrives on PlayStation Portal

CORSAIR Launches Second-Generation RMx SHIFT PSUs with Updated Cables and 12V-2×6 GPU Support
PC components

CORSAIR Launches Second-Generation RMx SHIFT PSUs with Updated Cables and 12V-2×6 GPU Support

Zenmuse L3 Launches as DJI's First Long-Range, High-Accuracy Aerial LiDAR System
Drones

Zenmuse L3 Launches as DJI's First Long-Range, High-Accuracy Aerial LiDAR System

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Noctua NF-A12x25 G2 fans

Noctua NF-A12x25 G2 fans

be quiet! Pure Loop 3 280mm

be quiet! Pure Loop 3 280mm

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed