Menu
Lenovo patches two high severity flaws in PC support tool

Lenovo patches two high severity flaws in PC support tool

The flaws could allow attackers to execute malicious code with system privileges and to kill other processes

Lenovo has fixed two high-severity vulnerabilities in the Lenovo Solution Center support tool that is preinstalled on many laptop and desktop PCs. The flaws could allow attackers to take over computers and terminate antivirus processes.

Lenovo Solution Center (LSC) allows users to check their system's virus and firewall status, update their Lenovo software, perform backups, check battery health, get registration and warranty information and run hardware tests.

The two new vulnerabilities, tracked as CVE-2016-5249 and CVE-2016-5248 in the Common Vulnerabilities and Exposures database, were found by security researchers from Trustwave. They affect LSC versions 3.3.002 and earlier.

The CVE-2016-5249 vulnerability allows an attacker who already has control of a limited account on a PC to execute malicious code via the privileged LocalSystem account.

Privilege escalation flaws like this one cannot be used by themselves to compromise computers, but are often used in exploit chains. Due to security improvements in modern operating systems, remote code execution flaws don't always provide attackers with full control over affected systems and need to be combined with privilege escalation vulnerabilities.

Because of the functionality in the LSC.Services.SystemService component, any local user can open a communication pipe to the service and force it to execute arbitrary .NET code. Because this LSC service runs under the LocalSystem account, the rogue code would also be executed with LocalSystem privileges.

The second vulnerability, CVE-2016-5248, allows any local user to send a command to LSC.Services.SystemService in order to kill any other process on the system, privileged or not. The target process could, for example, belong to an antivirus program or another security product.

Lenovo advises users to upgrade to LSC version 3.3.003. This can be done from the application itself by agreeing to automatic update prompt, from the separate Lenovo System Update utility or by downloading the latest version of LSC manually.

This is not the first time that serious flaws were found in LSC. However, Lenovo seems to be responding to such vulnerabilities in a timely manner by releasing patches and publishing security advisories. In a recent security analysis of the update tools preloaded on computers PC manufacturers, LSC was found to have one of the most secure implementations.

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments