{"id":4452,"date":"2016-05-14T12:59:24","date_gmt":"2016-05-14T08:29:24","guid":{"rendered":"http:\/\/news.apk.co.ir\/?p=1718"},"modified":"2016-05-14T12:59:24","modified_gmt":"2016-05-14T08:29:24","slug":"lenovo-software-lsc-has-a-major-security-risk","status":"publish","type":"manual_kb","link":"https:\/\/www.apk.co.ir\/kb\/lenovo-software-lsc-has-a-major-security-risk\/","title":{"rendered":"\u0631\u06cc\u0633\u06a9 \u0628\u0632\u0631\u06af \u0627\u0645\u0646\u06cc\u062a\u06cc \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 LSC \u0634\u0631\u06a9\u062a Lenovo"},"content":{"rendered":"
Lenovo Solution Center \u0646\u0633\u0628\u062a \u0628\u0647 \u062d\u0645\u0644\u0647 \u0628\u062f\u0627\u0641\u0632\u0627\u0631\u0647\u0627 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u0645\u06cc \u0628\u0627\u0634\u062f. \u0628\u0647 \u0645\u0646\u0638\u0648\u0631 \u062c\u0644\u0648\u06af\u06cc\u0631\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644 \u0634\u0631\u06a9\u062a Lenovo \u0627\u0642\u062f\u0627\u0645 \u0628\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u06cc\u06a9 \u0628\u0631\u0646\u0627\u0645\u0647 \u06cc \u0627\u0635\u0644\u0627\u062d\u06cc \u062f\u0631 \u0633\u0627\u06cc\u062a \u062e\u0648\u062f \u0646\u0645\u0648\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0627\u06cc\u0646 \u0628\u0631\u0646\u0627\u0645\u0647 \u0628\u0631\u0627\u06cc \u0639\u0645\u0648\u0645 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0642\u0627\u0628\u0644 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0648 \u062f\u0627\u0646\u0644\u0648\u062f \u0645\u06cc \u0628\u0627\u0634\u062f.<\/p>\n
\u062f\u0631 \u062d\u0627\u0644\u06cc \u06a9\u0647 \u062c\u0646\u062c\u0627\u0644\u200c\u0647\u0627 \u0628\u0631 \u0633\u0631 Superfish \u0628\u0647 \u062f\u0633\u062a \u0641\u0631\u0627\u0645\u0648\u0634\u06cc \u0633\u067e\u0631\u062f\u0647 \u0634\u062f\u060c \u0628\u062e\u0634 \u062f\u06cc\u06af\u0631\u06cc \u0627\u0632 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u0646\u0635\u0628\u200c\u0634\u062f\u0647 \u0628\u0631 \u0631\u0648\u06cc PC\u0647\u0627\u06cc Lenovo \u0628\u0627 \u0645\u0634\u06a9\u0644 \u0645\u0648\u0627\u062c\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0627\u06cc\u0646 \u0628\u0627\u0631 \u062f\u0644\u06cc\u0644 \u0622\u0646 \u06cc\u06a9 \u0633\u0648\u0621\u200c\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06af\u0633\u062a\u0631\u062f\u0647 \u0628\u062f\u200c\u0627\u0641\u0632\u0627\u0631\u06cc \u0645\u06cc\u200c\u0628\u0627\u0634\u062f.<\/p>\n
\u0645\u0634\u06a9\u0644 \u0627\u06cc\u062c\u0627\u062f \u0634\u062f\u0647 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631Lenovo Solution Center \u06cc\u0627 \u0628\u0647 \u0627\u062e\u062a\u0635\u0627\u0631 LSC \u0645\u06cc\u200c\u0628\u0627\u0634\u062f\u060c \u06a9\u0647 \u06a9\u0627\u0631\u0628\u0631\u062f \u0622\u0646 \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 Hub \u0645\u0631\u06a9\u0632\u06cc\u060c \u062c\u0647\u062a \u0645\u0627\u0646\u06cc\u062a\u0648\u0631 \u0646\u0645\u0648\u062f\u0646 \u0627\u0645\u0646\u06cc\u062a \u0648 \u0633\u0627\u0644\u0645 \u0628\u0648\u062f\u0646 \u0633\u06cc\u0633\u062a\u0645\u060c \u0645\u06cc\u200c\u0628\u0627\u0634\u062f. \u0641\u0631\u0636 \u0628\u0631 \u0622\u0646 \u0627\u0633\u062a \u06a9\u0647 LSC \u0648\u0636\u0639\u06cc\u062a Firewall \u0648 \u0648\u06cc\u0631\u0648\u0633 \u0633\u06cc\u0633\u062a\u0645 \u0631\u0627 \u0645\u0627\u0646\u06cc\u062a\u0648\u0631 \u0646\u0645\u0648\u062f\u0647 \u0648 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u0628\u0647 \u0631\u0648\u0632\u200c\u0631\u0633\u0627\u0646\u06cc \u0645\u06cc\u200c\u06a9\u0646\u062f\u060c \u0647\u0645\u0686\u0646\u06cc\u0646 \u0628\u0627\u062a\u0631\u06cc \u0631\u0627 \u0627\u0632 \u0646\u0638\u0631 \u0633\u0627\u0644\u0645 \u0628\u0648\u062f\u0646 \u0686\u06a9 \u06a9\u0631\u062f\u0647 \u0648 \u0641\u0631\u0622\u06cc\u0646\u062f \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u200c\u06af\u06cc\u0631\u06cc \u0631\u0627 \u0627\u062c\u0631\u0627 \u0645\u06cc \u0646\u0645\u0627\u06cc\u062f.<\/p>\n
\u0628\u0647 \u0634\u0645\u0627 \u067e\u06cc\u0634\u0646\u0647\u0627\u062f \u0645\u06cc \u06a9\u0646\u06cc\u0645 \u062d\u062a\u0645\u0627 \u0645\u0642\u0627\u0644\u0647 \u0648\u062c\u0648\u062f \u062d\u0641\u0631\u0647 \u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc SUPERFISH<\/a><\/strong> \u0631\u0627 \u0645\u0637\u0627\u0644\u0639\u0647 \u0646\u0645\u0627\u06cc\u06cc\u062f .<\/p>\n \u0637\u0628\u0642 \u0646\u0638\u0631 \u0645\u062d\u0642\u0642\u0627\u0646 \u062f\u0631\u0645\u062c\u0645\u0648\u0639\u0647 \u062a\u062d\u0642\u06cc\u0642\u0627\u062a\u06cc Trustwave SpiderLabs\u060c \u0645\u062a\u0627\u0633\u0641\u0627\u0646\u0647 \u0627\u06cc\u0646 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u062f\u0627\u0631\u0627\u06cc \u0646\u0642\u0627\u0637 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c \u0634\u062f\u06cc\u062f\u06cc \u0645\u06cc \u0628\u0627\u0634\u062f \u06a9\u0647 \u0628\u0647 Attacker\u0647\u0627 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f\u060c \u0633\u0631\u0648\u06cc\u0633 LSC \u0631\u0627 \u0627\u062c\u0631\u0627 \u0646\u0645\u0648\u062f\u0647 \u0648 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062a\u0631\u0641\u0646\u062f\u0647\u0627\u06cc\u06cc \u06a9\u062f\u0647\u0627\u06cc \u062f\u0644\u062e\u0648\u0627\u0647 \u062e\u0648\u062f \u0631\u0627 \u0628\u0631 \u0631\u0648\u06cc \u0633\u06cc\u0633\u062a\u0645 Local \u0627\u062c\u0631\u0627 \u0646\u0645\u0627\u06cc\u0646\u062f.<\/p>\n \u0628\u0647 \u06af\u0641\u062a\u0647 \u0645\u062d\u0642\u0642\u06cc \u06a9\u0647 \u0627\u06cc\u0646 Exploit \u0631\u0627 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0646\u0645\u0648\u062f\u0647 \u0627\u0633\u062a\u060c \u0628\u0627 \u0627\u06cc\u0646\u06a9\u0647 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0633\u06cc\u0627\u0631 \u062e\u0637\u0631\u0646\u0627\u06a9\u00a0\u0645\u06cc \u0628\u0627\u0634\u062f \u0627\u0645\u0627 \u062f\u0631 \u0639\u06cc\u0646 \u062d\u0627\u0644 \u0646\u06cc\u0627\u0632 \u0627\u0633\u062a \u06a9\u0647 \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631\u00a0\u0645\u0648\u062c\u0648\u062f \u0628\u0631 \u0631\u0648\u06cc \u0633\u06cc\u0633\u062a\u0645\u00a0\u0628\u0647 \u0622\u0646 Log in \u06a9\u0646\u062f \u062a\u0627 \u0627\u0645\u06a9\u0627\u0646 \u0647\u0631\u06af\u0648\u0646\u0647 \u062d\u0645\u0644\u0647 \u0627\u06cc \u0631\u0627 \u062f\u0627\u0634\u062a\u0647 \u0628\u0627\u0634\u062f \u0648 \u0645\u0627\u0646\u0646\u062f \u0628\u0639\u0636\u06cc \u0627\u0632 \u0645\u0648\u0627\u0631\u062f\u060c \u0627\u0645\u06a9\u0627\u0646 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645 \u0628\u0647 \u0635\u0648\u0631\u062a\u00a0Remote \u0648\u062c\u0648\u062f \u0646\u062f\u0627\u0631\u062f.<\/p>\n \u0634\u06cc\u0648\u0647 \u0627\u0635\u0644\u0627\u062d \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062a\u0648\u0633\u0637 Lenovo \u0627\u0631\u0627\u0626\u0647 \u0634\u062f\u0647 \u0648 \u0628\u0631\u0627\u06cc \u062f\u0627\u0646\u0644\u0648\u062f \u062f\u0631 \u0635\u0641\u062d\u0647 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0633\u0627\u06cc\u062a \u0634\u0631\u06a9\u062a \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a\u0647 \u0627\u0633\u062a \u0648 \u0628\u0627 \u062a\u0648\u062c\u0647 \u0628\u0647 \u0627\u06cc\u0646\u06a9\u0647 SpiderLab \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0627 \u0622\u0634\u06a9\u0627\u0631 \u0646\u0645\u0648\u062f\u0647 \u200c\u0627\u0633\u062a\u060c \u0635\u0631\u0641\u0627 \u0647\u0645\u06cc\u0646 \u06cc\u06a9 \u0631\u0627\u0647\u06a9\u0627\u0631 \u0628\u0631\u0627\u06cc \u0627\u0635\u0644\u0627\u062d \u0622\u0646 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f.<\/p>\n \u062f\u0631 \u062f\u0633\u0627\u0645\u0628\u0631 2015 \u0646\u06cc\u0632 \u0645\u0634\u06a9\u0644\u0627\u062a\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u0642\u0628\u06cc\u0644 \u0628\u0631\u0627\u06cc LSC \u0631\u062e \u062f\u0627\u062f\u0647 \u0628\u0648\u062f \u06a9\u0647 \u0637\u06cc \u0622\u0646 \u06cc\u06a9 \u06af\u0631\u0648\u0647 \u0647\u06a9\u0631 \u0628\u0647 \u0646\u0627\u0645 Slipstream\/Rol\u060c \u06cc\u06a9\u00a0Exploit \u0627\u0632 \u0646\u0648\u0639 Proof-of-Concept \u0631\u0627 \u0646\u0634\u0627\u0646 \u062f\u0627\u062f\u0646\u062f \u06a9\u0647 \u0628\u0631\u0627\u06cc \u0635\u0641\u062d\u0627\u062a \u0648\u0628 \u0645\u062e\u0631\u0628 \u0627\u0645\u06a9\u0627\u0646 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f\u06cc \u0631\u0627 \u0628\u0631 \u0631\u0648\u06cc PC\u0647\u0627\u06cc Lenovo \u0628\u0627 \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc System Privilege \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc\u200c\u0646\u0645\u0648\u062f \u0648 \u0627\u06cc\u0646 \u06a9\u0627\u0631 \u0628\u062f\u0648\u0646 \u0647\u06cc\u0686\u200c\u06af\u0648\u0646\u0647 \u0647\u0634\u062f\u0627\u0631 \u0642\u0628\u0644\u06cc \u0628\u0647 Lenovo \u0627\u0646\u062c\u0627\u0645 \u0645\u06cc \u0634\u062f \u06a9\u0647 \u0627\u06cc\u0646 \u0627\u0645\u0631 \u0628\u0647 \u0647\u06cc\u0686 \u0639\u0646\u0648\u0627\u0646 \u0645\u0637\u0644\u0648\u0628 \u0646\u0628\u0648\u062f. \u062f\u0631 \u062d\u0627\u0644 \u062d\u0627\u0636\u0631 \u0646\u06cc\u0632 \u0627\u06cc\u0646 Exploit \u062c\u062f\u06cc\u062f \u0628\u0627\u0639\u062b \u0628\u0631\u0648\u0632 \u0645\u0634\u06a9\u0644\u0627\u062a\u06cc \u062f\u0631 LSC \u0634\u062f\u0647 \u0627\u0633\u062a \u0648\u00a0\u067e\u0633 \u0627\u0632 \u0628\u0631\u0631\u0633\u06cc \u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0646\u062d\u0648\u0647 \u0627\u0635\u0644\u0627\u062d \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0631 \u0631\u0648\u06cc \u0633\u0627\u06cc\u062a \u0634\u0631\u06a9\u062a \u062c\u0647\u062a \u062f\u0627\u0646\u0644\u0648\u062f<\/a> \u0627\u0631\u0627\u0626\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a.<\/p>\n","protected":false},"author":1001503,"featured_media":3527,"parent":0,"menu_order":0,"template":"","format":"standard","manualknowledgebasecat":[2970],"manual_kb_tag":[9600,12232,12233,12234,12235,12003,12236,11963,12237,12088],"class_list":{"0":"post-4452","1":"manual_kb","2":"type-manual_kb","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"manualknowledgebasecat-security","8":"manual_kb_tag-lenovo","9":"manual_kb_tag-lenovo-solution-center-","10":"manual_kb_tag-lsc-","11":"manual_kb_tag---lsc","12":"manual_kb_tag--lenovo-solution-center","13":"manual_kb_tag-exploit","14":"manual_kb_tag--lsc","15":"manual_kb_tag-cyber-events","16":"manual_kb_tag---lenovo","17":"manual_kb_tag-security-risks"},"yoast_head":"\n\u0645\u0634\u06a9\u0644 \u0627\u0645\u0646\u06cc\u062a\u06cc LSC \u0634\u0631\u06a9\u062a \u0644\u0646\u0648\u0648<\/h2>\n