The AUEPLauncher service in Radeon AMD User Experience Program Launcher through 1.0.0.1 on Windows allows elevation of privilege by placing a crafted file in %PROGRAMDATA%\AMD\PPC\upload and then creating a symbolic link in %PROGRAMDATA%\AMD\PPC\temp that points to an arbitrary folder with an arbitrary file name.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://heynowyouseeme.blogspot.com/2020/02/privilege-escalation-filewrite-eop-in.html | third party advisory exploit |
https://heynowyouseeme.blogspot.com/2020/02/another-privilege-escalation-filewrite.html | third party advisory exploit |