The AUEPLauncher service in Radeon AMD User Experience Program Launcher through 1.0.0.1 on Windows allows elevation of privilege by placing a crafted file in %PROGRAMDATA%\AMD\PPC\upload and then creating a symbolic link in %PROGRAMDATA%\AMD\PPC\temp that points to an arbitrary folder with an arbitrary file name.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-29780 The AUEPLauncher service in Radeon AMD User Experience Program Launcher through 1.0.0.1 on Windows allows elevation of privilege by placing a crafted file in %PROGRAMDATA%\AMD\PPC\upload and then creating a symbolic link in %PROGRAMDATA%\AMD\PPC\temp that points to an arbitrary folder with an arbitrary file name.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T10:12:11.002Z

Reserved: 2020-02-12T00:00:00

Link: CVE-2020-8950

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-12T20:15:15.010

Modified: 2024-11-21T05:39:43.617

Link: CVE-2020-8950

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.