CVE-2020-5316

Dell SupportAssist for Business PCs versions 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3 and Dell SupportAssist for Home PCs version 2.0, 2.0.1, 2.0.2, 2.1, 2.1.1, 2.1.2, 2.1.3, 2.2, 2.2.1, 2.2.2, 2.2.3, 3.0, 3.0.1, 3.0.2, 3.1, 3.2, 3.2.1, 3.2.2, 3.3, 3.3.1, 3.3.2, 3.3.3, 3.4 contain an uncontrolled search path vulnerability. A locally authenticated low privileged user could exploit this vulnerability to cause the loading of arbitrary DLLs by the SupportAssist binaries, resulting in the privileged execution of arbitrary code.
References
Link Resource
http://www.dell.com/support/article/SLN320101 Patch Vendor Advisory
http://www.dell.com/support/article/SLN320101 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dell:supportassist_for_business_pcs:2.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_business_pcs:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_business_pcs:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_business_pcs:2.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_business_pcs:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_business_pcs:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_business_pcs:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:2.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:2.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:2.2:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:3.0:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:3.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:3.2:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:3.3:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:dell:supportassist_for_home_pcs:3.4:*:*:*:*:*:*:*

History

21 Nov 2024, 05:33

Type Values Removed Values Added
References () http://www.dell.com/support/article/SLN320101 - Patch, Vendor Advisory () http://www.dell.com/support/article/SLN320101 - Patch, Vendor Advisory

Information

Published : 2021-07-22 17:15

Updated : 2024-11-21 05:33


NVD link : CVE-2020-5316

Mitre link : CVE-2020-5316

CVE.ORG link : CVE-2020-5316


JSON object : View

Products Affected

dell

  • supportassist_for_business_pcs
  • supportassist_for_home_pcs
CWE
CWE-427

Uncontrolled Search Path Element