Description
Multiple serious vulnerabilities have been found in Lenovo System Update. Malicious users can exploit these vulnerabilities to bypass security restrictions or gain privileges.
Below is a complete list of vulnerabilities
- Lack of command piping restrictions can be exploited locally via named pipe manipulations;
- Lack of file signatures verification can be exploited remotely via a specially designed executable files;
- Lack of directory permissions restrictions can be exploited locally via a files manipulations.
Original advisories
Related products
CVE list
- CVE-2015-2234 high
- CVE-2015-2233 critical
- CVE-2015-2219 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!