CVE-2022-29092
https://notcve.org/view.php?id=CVE-2022-29092
Dell SupportAssist Client Consumer versions (3.11.0 and versions prior) and Dell SupportAssist Client Commercial versions (3.2.0 and versions prior) contain a privilege escalation vulnerability. A non-admin user can exploit the vulnerability and gain admin access to the system. Dell SupportAssist Client Consumer versiones (3.11.0 y versiones anteriores) y Dell SupportAssist Client Commercial (3.2.0 y versiones anteriores) contienen una vulnerabilidad de escalada de privilegios. Un usuario no administrador puede aprovechar la vulnerabilidad y conseguir acceso de administrador al sistema • https://www.dell.com/support/kbdoc/en-us/000200456/dsa-2022-139-dell-supportassist-for-home-pcs-and-business-pcs-security-update-for-multiple-security-vulnerabilities • CWE-427: Uncontrolled Search Path Element •
CVE-2020-5316
https://notcve.org/view.php?id=CVE-2020-5316
Dell SupportAssist for Business PCs versions 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3 and Dell SupportAssist for Home PCs version 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3, 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, 3.2.1, 3.2.2, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.4 contain an uncontrolled search path vulnerability. A locally authenticated low privileged user could exploit this vulnerability to cause the loading of arbitrary DLLs by the SupportAssist binaries, resulting in the privileged execution of arbitrary code. Dell SupportAssist for Business PCs versiones 2.0, 2.0.1, 2.0.2, 2.1, 2.1.2, 2.1.3 y Dell SupportAssist for Home PCs versiones 2.0, 2.0.1, 2.0.2, 2.1, 2.1. 1, 2.1.2, 2.1.3, 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, 3.2.1, 3.2.2, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.4, contienen una vulnerabilidad de búsqueda de ruta no controlada. Un usuario poco privilegiado autenticado localmente podría explotar esta vulnerabilidad para causar la carga de DLL arbitrarias por parte de los binarios de SupportAssist, resultando en una ejecución privilegiada de código arbitrario • http://www.dell.com/support/article/SLN320101 • CWE-427: Uncontrolled Search Path Element •
CVE-2021-21518
https://notcve.org/view.php?id=CVE-2021-21518
Dell SupportAssist Client for Consumer PCs versions 3.7.x, 3.6.x, 3.4.x, 3.3.x, Dell SupportAssist Client for Business PCs versions 2.0.x, 2.1.x, 2.2.x, and Dell SupportAssist Client ProManage 1.x contain a DLL injection vulnerability in the Costura Fody plugin. A local user with low privileges could potentially exploit this vulnerability, leading to the execution of arbitrary executable on the operating system with SYSTEM privileges. Dell SupportAssist Client for Consumer PCs versiones 3.7.x, 3.6.x, 3.4.x, 3.3.x, Dell SupportAssist Client for Business PCs versiones 2.0.x, 2.1.x, 2.2.x y Dell SupportAssist Client ProManage versión 1.x, contienen una vulnerabilidad de inyección DLL en el plugin Costura Fody. Un usuario local poco privilegiado podría explotar esta vulnerabilidad, conllevando a una ejecución de un ejecutable arbitrario en el sistema operativo con privilegios SYSTEM • https://www.dell.com/support/kbdoc/en-us/000184012/dsa-2021-052-dell-supportassist-for-home-pcs-business-pcs-security-update-for-pc-doctor-plugin-vulnerability • CWE-427: Uncontrolled Search Path Element •
CVE-2019-12280
https://notcve.org/view.php?id=CVE-2019-12280
PC-Doctor Toolbox before 7.3 has an Uncontrolled Search Path Element. PC-Doctor Toolbox anterior a la versión 7.3 tiene un elemento path de búsqueda no controlada. • http://packetstormsecurity.com/files/153374/PC-Doctor-Toolbox-DLL-Hijacking.html http://seclists.org/fulldisclosure/2019/Jun/29 http://www.pc-doctor.com/company/pr-articles/130-pc-doctor-responds-to-software-vulnerability-report http://www.securityfocus.com/bid/108880 https://safebreach.com/Press-Post/SafeBreach-Identifies-Serious-Vulnerability-In-PC-Doctor-Software https://seclists.org/fulldisclosure/2019/Jun/29 https://www.dell.com/support/article/il/en/ilbsdt1/sln317291/dsa-2019-084-dell-supportassist • CWE-427: Uncontrolled Search Path Element •