CVE-2020-8950
12.02.2020, 20:15
The AUEPLauncher service in Radeon AMD User Experience Program Launcher through 1.0.0.1 on Windows allows elevation of privilege by placing a crafted file in %PROGRAMDATA%\AMD\PPC\upload and then creating a symbolic link in %PROGRAMDATA%\AMD\PPC\temp that points to an arbitrary folder with an arbitrary file name.
Vendor | Product | Version |
---|---|---|
amd | user_experience_program | 𝑥 ≤ 1.0.0.1 |
𝑥
= Vulnerable software versions
References