Over 1 million tech questions and answers.

Privilege Escalation Vulnerability in Linux #CVE-2014-9322

Q: Privilege Escalation Vulnerability in Linux #CVE-2014-9322

 
Lutomirski had recently reported the CVE-2014-9090 which was caused due to improper handling of faults associated with the Stack Segment (SS) register on the x86 architecture. After notification of CVE-2014-9090, Borislav Petkov pointed out to Lutomirski some further flaws that existed even after vulnerability.  After  research Lutomirski discovered that there were two bugs in the improper handling of Stack Segment (SS) register.  The new kernel kernel vulnerability is now identified CVE-2014-9322 and allows potential hacker to  gain privilege escalation on all X86_64 systems.
 
 
“Any kernel that is not patched against CVE-2014-9090 is vulnerable to privilege escalation due to incorrect handling of a #SS fault caused by an IRET instruction. In particular, if IRET executes on a writeable kernel stack (this was always the case before 3.16 and is sometimes the case on 3.16 and newer), the assembly function general_protection will execute with the user’s gsbase and the kernel’s gsbase swapped,” Lutomirski explained in an advisory.
He added that, “This is likely to be easy to exploit for privilege escalation, except on systems with SMAP or UDEREF. On those systems, assuming that the mitigation works correctly, the impact of this bug may be limited to massive memory corruption and an eventual crash or reboot.”
Privilege Escalation Vulnerability in Linux #CVE-2014-9322
 
.

Read other answers
RELEVANCY SCORE 200
Preferred Solution: Privilege Escalation Vulnerability in Linux #CVE-2014-9322

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

RELEVANCY SCORE 109.2

A vulnerability in the Panda 2016 products that allows the execution of code with elevated permissions has been detected in Small Business Protection and Panda 2016 products. The PSEvents.exe process is periodically run with elevated permissions and has dependencies of libraries located both in the default directory as well as in other system libraries. As the USERS group has Write permissions over the folder where the PSEvent.exe process is run and because the system first looks for libraries run by this process in the execution folder, it may be possible to create a malicious library in the execution folder that will replace one of the libraries installed in other folders. Therefore, a user could run malicious code with SYSTEM privileges.

Privilege escalation vulnerability in PSEvents.exe with Panda 2016 products - Technical Support - Panda Security
 

Read other answers
RELEVANCY SCORE 109.2

 
Security researchers have find out ways to hijack the Intel-compatible PCs running Linux by exploiting the physical weaknesses in certain varieties of DDR DRAM (double data rate dynamic random-access memory) chips and gaining higher kernel privileges on the system.
 
The technique, dubbed "rowhammer", was outlined in a blog post published Monday by Google's Project Zero security initiative, a team of top security researchers dedicatedly identifies severe zero-day vulnerabilities in different software.
 
Rowhammer is a problem with recent generation DRAM chips in which repeatedly accessing a row of memory can cause "bit flipping" in an adjacent row which could allow anyone to change the value of contents stored in computer memory.
 
 
WHAT IS ROWHAMMER BUG
DDR memory is arranged in an array of rows and columns, which are assigned to various services, applications and OS resources in large blocks. In order to prevent each application from accessing the memory of other application, they are kept in a "sandbox" protection layer.
 
However, Sandbox protection can be bypassed using Bit flipping technique in which a malicious application needs to repeatedly access adjacent rows of memory in a tiny fraction of a second.
 
As a result, hammering two aggressor memory regions can disturb neighbouring locations, causing charge to leak into or out of neighbouring cells.

DRAM Rowhammer vulnerability Leads to Kernel Privilege Escalation

A:DRAM Rowhammer vulnerability Leads to Kernel Privilege Escalation

Program for testing for the DRAM "rowhammer" problem
The test should work on Linux or Mac OS X, on x86 only.
 
 
https://github.com/google/rowhammer-test
 

Read other 4 answers
RELEVANCY SCORE 103.6

The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.http://web.nvd.nist.gov/view/vuln/detail?v...d=CVE-2009-2692What this amounts to is that someone with physical access to an affected computer could gain root and wreak havoc. Debian and Ubuntu have already released patches and users are urged to update immediately through their distro's update utility.Proof of concept code for an exploit is already available.

Read other answers
RELEVANCY SCORE 80

Hi,
 
I have been investigating on the privilege escalation vulnerability when we use methods of named pipe. This vulnerability is reported for Windows Server 2000 as per bulletin -
Microsoft Security Bulletin MS00-053 -  Critical and Windows Server 2008 as per bulletin -
Microsoft Security Bulletin MS10-059 - Important.

The similar vulnerability is also reported for Windows Server 2012 in bulletin - Microsoft Security Bulletin MS15-050 - Important. I just want to make sure
that, whether the vulnerability identified for Windows Server 2012 is also due to use of the
CreateNamedPipe method and impersonation or due to some different reason. 
If this vulnerability mentioned in the bulletin - Microsoft
Security Bulletin MS15-050 - Important, is not related to Named Pipe, then is there other vulnerability with Named pipe which leads to privileges escalation?

Regards,
Renukadas

Read other answers
RELEVANCY SCORE 80

Latest, and possibly earlier builds, of the PavTPK.sys kernel mode driver of Panda Security software suffers from a heap overflow bug that allows any user to elevate their privileges through an IOCTL request and execute code as SYSTEM by controlling the EIP via a corrupted kernel object.

Upon unsuccessful exploitation the system will crash with a BSoD.
This driver is loaded into kernel memory during boot time and stays resident without touching the disk later.

All Panda Security products using the faulty driver were foujnd to be vulnerable.

https://www.portcullis-security.com...-downloads/security-advisories/cve-2014-5307/
 

A:Privilege Escalation in Panda Security

22/07/2014 Fix confirmed
 

Read other 1 answers
RELEVANCY SCORE 79.2

Lenovo Security Advisory: LEN-2015-011
Potential Impact: Execution of arbitrary code
Severity: Medium

Summary:
Multiple vulnerabilities have been identified within Lenovo System Update (previously known as ThinkVantage System Update). Lenovo has released a new version of the Lenovo System Update software that addresses these vulnerabilities.

Description:
Lenovo System Update validates all system update files as they are downloaded from the Lenovo servers. However, if the local system contains malware, it is possible that the downloaded updates could be altered before installation creating a race condition. The latest Lenovo System Update release eliminates this possibility. Lenovo System Update uses a service called SUService.exe to run system updates. As part of the authentication and validation process the service only accepts commands if a valid security token is passed along with the command. Vulnerabilities were discovered on how the security tokens were generated allowing an attacker to run commands. The latest Lenovo System Update release fixes the token authentication flaws.
Other security issues were also addressed in this update.
Mitigation Strategy for Customers (what you should do to protect yourself):
Starting from April 1, 2015, run Lenovo System Update and install the latest version of the application, version 5.06.0034 or later. You can determine the currently installed version by opening Lenovo System Update, clicking on the green question mark in the ... Read more

A:Lenovo System Update Privilege Escalation

Bundleware/ Crapware: This is why I do a clean install on a brand new PC.

Read other 1 answers
RELEVANCY SCORE 79.2

Versions 5.0 ? 7.0 of ESET Smart Security and ESET Endpoint Security products for Windows XP OS allow a low privileged user to execute code as SYSTEM by exploiting a vulnerability in the ESET Personal Firewall NDIS filter (EpFwNdis.sys) kernel mode driver also mentioned as Personal Firewall module: Build 1183 (20140214) and prior. This is a ?trusted value vulnerability? that can be triggered through a specific IOCTL with a specifically crafted buffer, to force the driver to validate an improper IOCTL.

https://www.portcullis-security.com...-downloads/security-advisories/cve-2014-4973/
 

A:Privilege Escalation In ESET Products For Windows

This was patched, wasn't it?
"27/06/2014 | Fix confirmed"
 

Read other 1 answers
RELEVANCY SCORE 78

Have a few computers missing this (MS15-058) Microsoft SQL Server Privilege Escalation (3065718) patch.

Get access denied just by trying to run the patch: SQLServer2008-KB3045305-x64.exe even though I'm logged in with my domain admin account.

I do a run as administrator with my domain admin account and GUI will start but will still fail with Setup account privileges failed.

Local admin account has same problem.
Screen shots attached.

Has anyone come across a problem like this??

A:(MS15-058) Microsoft SQL Server Privilege Escalation (3065718)

at what Service Pack level is your SQL Server install?
I am NOT any kind of expert in domain permissions! - have you checked the two links in the error message?
https://msdn.microsoft.com/en-us/library/ms813696.aspx
https://msdn.microsoft.com/en-us/library/ms813959.aspx

It's always possible that there is registry corruption present which is preventing access to certain keys - that's also worth checking.

Read other 1 answers
RELEVANCY SCORE 78

hi guys

There is a way to deny interactive logon to a workstation but permit the priviledge escalation(run as)?
I tried with this local GPO

Use Computer Configuration / Windows Settings / Security Settings / Local Policy User Rights Assignment
to set Deny logon locally for this account.

but it does not work because deny also the privilege escalarion or run as...not only the interactive logon. We would need for some Laptop in workgroup

tanks a lot!
GIO

Read other answers
RELEVANCY SCORE 70.4

Hiya

A privilege elevation vulnerability exists in the way that Microsoft Windows starts applications with specially crafted file manifests. This vulnerability could allow a logged on user to take complete control of the system

Affected Software:

Microsoft Windows XP Service Pack 2
Microsoft Windows Server 2003
Microsoft Windows Server 2003 for Itanium-based Systems

http://www.microsoft.com/technet/security/bulletin/ms06-075.mspx

Regards

eddie
 

Read other answers
RELEVANCY SCORE 70.4

We recently updated our ATA installation to version 1.6 and we're getting a lot of "Privilege escalation using forged authorization data" alerts in the console.  We can see that the information is all for an application we use company wide
called Projectwise and the software appears to be generating these even though everything is operating as expected.  Is there anyway we can mark a bunch of these as dismissed in bulk instead of having to go through each one?  Or has anyone tried
to dig into these sorts of alerts with a software vendor to try and find out why the traffic is coming up suspicious?  We've got over 500 of them in 3 days, so it's getting a bit out of hand...

Read other answers
RELEVANCY SCORE 68.8

Hello,
I'm with security issue CVE-2020-1472 | Netlogon Elevation of Privilege Vulnerability and the following occurs to me:

I'm having trouble starting to collect events 5827-5831
I have installed the August 2020 update on a DC Microsot Windows Server 2012 R2 to start the event collection, and no events appear, even when logging in with Microsoft Windows Server 2012 without the August update.

I have set the FullSecureChannelProtection registry key to 1, and from a server with Microsoft Windows Server 2012 without the August 2020 update I can login without problems.

No events appear in the security log and I can login without problems with FullSecureChannelProtection at 1. I don't understand where the problem is. Can anyone give me any clues?

sorry for my english
Thanks

Read other answers
RELEVANCY SCORE 68.4

Hi everyone,
Our Nessus scanner detected the following vulnerability :


Description
<section>

The version of Microsoft Malware Protection Signature Update Stub (MpSigStub.exe) installed on the remote Windows host is prior to 1.1.16200.1. It is, therefore, affected by a elevation of privilege vulnerability which could allow an attacker who successfully
exploited this vulnerability to elevate privileges on the system.

</section>
Solution
<section>

Enable automatic updates to update the scan engine for the relevant antimalware applications. Refer to Knowledge Base Article 2510781 for information on how to verify that MMPE has been updated.

</section>
Plugin Output
<section>
Product : Microsoft Malware Protection Signature Update Stub
Path : C:\Windows\System32\MpSigStub.exe
Installed version : 1.1.15000.2
Fixed version : 1.1.16200.1
</section>
I don't understand how to fix that issue, is there any patches ?
Regards,
Lucas

Read other answers
RELEVANCY SCORE 67.6

Hi
With this latest vulnerability, i need some clarification about what exactly is a "Non-Compliant Device".
In the KB articles definition, A non-compliant device is one that uses a vulnerable Netlogon secure channel connection.
So that means, lets say you have a Windows machine, that has not been patched correctly, and still uses vulnerable netlogon connection.
So once the DC is patched for this vulnerability, what will happen to this Windows machine?
Will it get denied connection and be reported in event ID: 5827/5828?
Or will it be allowed connection, as it is technically a non-compliant device based on the definition, as it is using vulnerable netlogon connection? And be logged under event ID: 5829?

The other question i have is for the use of the GPO policy: "Domain controller: Allow vulnerable Netlogon secure channel connections"
So i understand that this will bypass the enforcement.
However, if the "Non-Compliant" device is not a windows device, i will assume that the GPO will not work for these devices. So when in enforcement phase, for these such non windows devices that is still using vulnerable netlogon connection, there
is no workaround right? Either get vendor to provide a fix or decommission?

Thanks DM.

DM

Read other answers
RELEVANCY SCORE 63.6

I'd like to include Dell's list of affected systems here: http://spywarehammer.com/current-news/intel-vulnerability/msg155913/#msg155913My search at Dell produced no results. Does a list exist?

Read other answers
RELEVANCY SCORE 59.2

Patches Available for Linux Sudo Vulnerability

Red Hat, Debian and other Linux distributions yesterday pushed out patches for a high-severity vulnerability in sudo that could be abused by a local attacker to gain root privileges.

Sudo is a program for Linux and UNIX systems that allows standard users to run specific commands as a superuser, such as adding users or performing system updates.

In this case, researchers at Qualys found a vulnerability in sudo?s get_process_ttyname function that allows a local attacker with sudo privileges to run commands as root or elevate privileges to root.

An alert on the sudo project website says SELinux must be enabled and sudo built with SELinux support for the vulnerability to be triggered. Sudo 1.8.6p7 through 1.8.20 are affected. Users should update sudo to 1.8.20p1.
?On Linux systems, sudo parses the /proc/[pid]/stat file to determine the device number of the process?s tty (field 7). The fields in the file are space-delimited, but it is possible for the command name (field 2) to include white space (including newline), which sudo does not account for,? the sudo advisory said. ?A user with sudo privileges can cause sudo to use a device number of the user?s choosing by creating a symbolic link from the sudo binary to a name that contains a space, followed by a number.?

Qualys declined to comment for this article.

?This issue, if exploited, allows the attacker to circumvent the controls and do more than they are sup... Read more

Read other answers
RELEVANCY SCORE 58.4

Linux Systemd Vulnerability Enables DNS Attacks

In January 2017, security researcher Sebastian Krahmer found a bug in Linux systems which could be exploited to grant cyber-attackers root access to a targeted machine. On June 27 2017, software engineer Chris Coulson reported a different systems vulnerability.

The CVE-2017-9445 bug can be exploited by cyber-attackers with TCP packets that trick the systemd initialization daemon to enable the execution of malicious code, or trigger system crashes.

According to Coulson, ?Certain sizes passed to dns_packet_new can cause it to allocate a buffer that's too small. A page-aligned number - sizeof(DnsPacket) + sizeof(iphdr) + sizeof(udphdr) will do this?so, on x86 this will be a page-aligned number?80. Eg, calling dns_packet_new with a size of 4016 on x86 will result in an allocation of 4096 bytes, but 108 bytes of this are for the DnsPacket struct.




A malicious DNS server can exploit this by responding with a specially crafted TCP payload to trick systemd-resolved in to allocating a buffer that's too small, and subsequently write arbitrary data beyond the end of it.?

Coulson reports that the bug was introduced in systemd version 233 in 2015, and affecters versions through 233.

Linux's systemd is a crucial feature, which is used by many distributions to bootstrap the user space and manage all subsequent processes. The program was created by Red Hat developers. Distributions that can be exploited thr... Read more

Read other answers
RELEVANCY SCORE 56.8

Hello, I just received a 2nd generation X1 carbon as a gift from my brother (his old work laptop). It was running Windows 7 without issues. Since I'm mostly studying Linux development, I immediately wiped the hard drive and installed Ubuntu 16.04 LTS. Now the adaptive keyboard is firing random key presses (keystrokes) all of the time. It's really quite unusable (WiFi turning on and off, audio on and off, and random function keys getting pressed). Since it wasn't doing this before, I'm confident that this is something I did when I set the machine up for myself. What I did was to wipe the entire hard drive. I removed all of the partitions including the windows restore and other partitions (I can't remember what they were all called, but I seem to recall that they were factory partitions from Lenovo). Once I started Linux, the crazy behavior began (about 5-20 random key presses per minute). But the crazy thing is that behavior also exhibits itself even before Linux boots. If I boot into the BIOS setup, the adaptive keyboard will continue to fire off the phantom key presses (I can tell because I see the keyboard icons changing as well as the computer beeping every time it randomly chooses an "illegal" key). So, that implies to me that it isn't Linux that is causing the issue directly (it may have triggered something, but it isn't, say, an actively malfunctioning driver). A few more data points. If I reset the BIOS (sometimes I have to ... Read more

A:X1 Carbon (2014) Adaptive keyboard random key presses after HD wipe & Linux install

Update:I wiped the drive again and this time installed Win10. The keyboard *seems* to have settled down.I say *seems* because at one point it appears to have registered a screen grab? The system beeped and a moment later it was asking me where to save the screen grab. Beyond that, no random keyboard presses that I am aware of.Of course, the adaptive keyboard doesn't do anything at all now either. I can't get it to change from the default function key row.I took this opportunity to update the BIOS which was on 1.17 to the latest 1.31.I'm going to re-install Linux alongside Windows now to see how it behaves.

Read other 2 answers
RELEVANCY SCORE 56.8

Hello, I just received a 2nd generation X1 carbon as a gift from my brother (his old work laptop). It was running Windows 7 without issues. Since I'm mostly studying Linux development, I immediately wiped the hard drive and installed Ubuntu 16.04 LTS. Now the adaptive keyboard is firing random key presses (keystrokes) all of the time. It's really quite unusable (WiFi turning on and off, audio on and off, and random function keys getting pressed). Since it wasn't doing this before, I'm confident that this is something I did when I set the machine up for myself. What I did was to wipe the entire hard drive. I removed all of the partitions including the windows restore and other partitions (I can't remember what they were all called, but I seem to recall that they were factory partitions from Lenovo). Once I started Linux, the crazy behavior began (about 5-20 random key presses per minute). But the crazy thing is that behavior also exhibits itself even before Linux boots. If I boot into the BIOS setup, the adaptive keyboard will continue to fire off the phantom key presses (I can tell because I see the keyboard icons changing as well as the computer beeping every time it randomly chooses an "illegal" key). So, that implies to me that it isn't Linux that is causing the issue directly (it may have triggered something, but it isn't, say, an actively malfunctioning driver). A few more data points. If I reset the BIOS (sometimes I have to ... Read more

Read other answers
RELEVANCY SCORE 56

Four vulnerabilities in the Graphite (or libgraphite) font processing library allow attackers to compromise machines by supplying them with malicious fonts...
The worst is an out-of-bounds read bug (CVE-2016-1521) that allows attackers to crash the system and even execute arbitrary code on the machine...
Users don't even have to click on the attacker's links and can be forced to access the malicious Web page hosting weaponized Graphite-enabled fonts via hidden redirects, often used by malvertising campaigns.
Researchers say they tested only Libgraphite 2-1.2.4... [and Softpedia has confirmed that] these issues have been fixed in Graphite 2-1.3.5.
http://news.softpedia.com/news/vulnerability-in-font-processing-library-affects-linux-openoffice-firefox-500027.shtml
================================================
Remark:  It is unclear to me how one determines what version of (lib)graphite they have/are running on their system? And if it's the vulnerable one, how one updates to the newer version?... Or is this something that THEY (automatically) update at the server-end??
============================================
(With acknowledgment to Minimalist for posting at Wilders)

A:Graphite Font Vulnerability in Firefox, PaleMoon, WordPad, Open/LibreOffice, and Linux

PaleMoon 26.1 has addressed this issue, by updating its Graphite2 font library to 1.3.5+

http://en.community.dell.com/support-forums/virus-spyware/f/3522/t/19675613

Read other 3 answers
RELEVANCY SCORE 50.4

VIPRE Internet Security 2014 is packed with sophisticated computer internet security features that protect against viruses and other malware threats without slowing down your PC. You won't notice it's running (even during scans and updates).

http://www.vipreantivirus.com/VIPRE-Internet-Security/
http://www.vipreantivirus.com/VIPRE-antivirus/

Features:

NEW Social Watch ?
Scans your Facebook page for bad links that could infect PCs with malware like viruses and Trojans, or expose you and your friends to other online threats.

NEW Search Guard ?
Helps you browse the web safely by identifying links that could infect your PC with viruses, Trojans or other online threats.*

Auto Patch ?
Defends against the most common cause of infections ? vulnerable software ? by automatically updating programs on your PC.

VIPRE Easy Install ?
Ensures a smooth, trouble-free installation process by eliminating possible computer internet security software conflicts.

Two-way firewall
Protects against incoming and outgoing Internet traffic quickly
and easily with customizable settings for advanced users.

Spam filter
Filters unwanted email from your inbox and safeguards against spam, phishing scams and malicious URLs.

Bad website blocker
Blocks access to malicious websites containing computer internet security threats to prevent you from inadvertently browsing to them and compromising your PC.

High-performance anti-malware engine
Combine... Read more

A:Vipre Internet Security 2014 and Antivirus 2014 Final

vipre has improved there antivirus engine. There web protection works great.

Also they provide lifetime license which can be used on a PC for 20 years.
 

Read other 8 answers
RELEVANCY SCORE 47.2

Hello everyone from a Newbie..  I hope this post is in the correct forum?                                                                                                                  
My current internet security will expire in 2 weeks. I currently have Kaspersky Internet Security 2013 and would like to upgrade to v2014, but unfortunately, I cannot properly install v2014 as the GUI will not load. I have tried various solutions offered from the Kaspersky forum, but no luck.I would like to know from you guys which Internet Security suite I should buy from these 2 AV's in terms of overall protection:  Bitdefender Internet Security 2014 or Norton Internet Security 2014.I have used a trial version of both of them for 2 weeks each,  and found both of them excellent, but unsure which one to go for. 
 
I use online banking, ebay, facebook and of course, general surfing  .Any thoughts and opinions... Read more

A:Bitdender 2014 vs Norton 2014, which one should I buy?

I actually tried them all and i am in the IT field for 12 years, but for home use i chose GData.
Bitdefender is good, i was pleased but i tested Gdata and it detected many things the other ones i had did not so i chose it and bought a license last month for my home laptop.
I tested BitDefender for a few weeks and it was great until I had a weird bug with manual scan, it used to detect viruses on a n external usb drive but would not clean them, i mailed support and it got stuck somewhere in their pile of bugs.....so i decided not to purchase it.
With Norton for home i am not familiar but Symantec endpoint for business is super aggressive if you do not know how to set it up correctly....
Now that i think of it, my dad used to have Norton, he liked it. But for some reason he switched to Kaspersky....Maybe because he is Russian ;-))

Read other 12 answers
RELEVANCY SCORE 47.2

What do you prefer?

A:Kaspersky 2014 vs Bitdefender 2014

Neither...

Read other 7 answers
RELEVANCY SCORE 47.2

I currently have AVG 2014, but i actually wanted to try out a new antivirus program. I wanted to know which one offers the best protection against viruses. But so far i have only been seeing mixed reviews about both programs so i came here to get a better answer from the community !

(Note: I know i cannot have more than one Antivirus programs on my PC which is why i will be removing AVG if Avast is recommended the most. I also have Malwarebytes on my computer as well since that program is Standalone & causes zero conflict with AVG)

A:Which is Better: AVG Free 2014 or Avast 2014?

Hi,
Good security combination,
http://www.sevenforums.com/system-security/206705-good-free-system-security-combination.html
http://www.sevenforums.com/system-security/297196-top-av-program-use-here-seven.html

Should of added to the poll None of the above

Read other 9 answers
RELEVANCY SCORE 43.6
RELEVANCY SCORE 43.6

Appreciate any advice how i can Escalate case to Lenovo HQ (not in my local country), anyone know of Escalating mail i can use? Thanks

Read other answers
RELEVANCY SCORE 43.2

Hey All. On December 19th after I had to nag nag nag to get anyone's attention my case was escalated. That was December 19th and I haven't had anyone reach out. Has anyone else ever been told their case has been escalated and how long did you wait?

Read other answers
RELEVANCY SCORE 43.2
RELEVANCY SCORE 42.8

Hi Terry,
IF there are any porblem with the system laptop or a desktop and the customer Agent does not meet/give a satisfying answer to the customer.How can a customer approach the Escalation ? so get a resolution at the earliest ?

A:How to approach escalation team.

Aaron
 
If you have a technical problem with a existing notebook please report here the symptoms that you are having with the notebook.  I will be happy to help.   If you have spoken with tech support and have case numbers shoot me a private message with the service tag and the case numbers and I will be happy to investigate.
You can also try the unresolved issues mail box located on the following link.  Please understand you will need the case numbers that you have had with tech or care to be able to further escalate
https://support.dell.com/support/topics/global.aspx/support/dellcare/outstanding_issues?c=us&l=en&s=gen
 
TB

Read other 11 answers
RELEVANCY SCORE 42.8

I have been referred t this forum from "Am I Infected..." after trying several things.The short history of things we have tried is here: http://www.bleepingcomputer.com/forums/t/206565/search-results-hijacked-intermittently/I dds,scr will not run for me; it flashes the black dos screen and dies. I have run RSIT as instructed and the log file is attached.THANKS!

A:browser hijack escalation

Howdy, my name is Hoov, and I will be helping you with your dilemma.Please make sure you watch this thread for responses. If you click the options tab at the top of your first post, you can select to track this thread. Here is what I am asking you to do during the repair of your computer*Tell me everything that you have done, if anything, to try and fix this problem.*Please only use 1 forum to help clear up your problem. Posting on more than 1 and following instructions from more than 1 forum will cause those helping you to pull out thier hair.*Follow my instructions - If you can't for some reason, or if you don't understand something, please tell me. If you deviate from my instructions, tell me, it may make a difference on where we go. Don't install anything, even other programs that have nothing to do with security or malware, it could cause things to change, and I would never know it. *Have faith. I will do all I can to get your computer working, and if I can't - someone else here will know something else to try. *Stick with me to the end. My aim is to fix your problems, and give you the tools and knowledge to keep this from happening again.Now onto trying to fix your computer. I am looking over your log, and I will be back in a bit with some instructions.If I am helping you and you don't hear from me for 24Hrs, send me a PM Please!Sorry about the delay in getting to your log. I hope you are still able to get online and run software.Run comboFix.exe. Please visit this ... Read more

Read other 2 answers
RELEVANCY SCORE 42.8

Trying to reach the escalation manager but there is no response. Send an email, left a voicemail but no use.  case number 03781286 Escalation amanger: Rosemary Campbell

Read other answers
RELEVANCY SCORE 42.8

Please share us escalation matrix for lenovo thinkpad. I am having lenovo t410i. 

A:Escalation Matrix Require

Hello Rk,
 
I don't believe I understand what you are asking for. Do you have a problem with your t410i that we can help you with?

Read other 1 answers
RELEVANCY SCORE 42.4

i wonder if anyone can help with this formula.

The figures are

Sum insured R1,350,360
Escalation @ 10% R135,036
Total R1,485,396
Monthly Premium R127.62

the figures above are correct but have been calculated manually (not by me).

I need one formula in the 'Monthly Premium' column which does the following:

Multiplies sum insured by .1%
Multiplies Escalation by .1% and then halves that Esc figure as only 50% of the .1% will be paid by the client
This result is the annual premium - 8% must be added to the annual premium and then divided by 12 to give the monthly premium
The monthly premium should result in the figure above R127.62.
 

A:Solved: Excel escalation formula

Read other 16 answers
RELEVANCY SCORE 42

I own a Lenovo Ideapad Z510 laptop which has ADP warranty. Seems, my laptop has a history of issues with Wireless card and unfortunately I came across that once again (earliest it came up in August 2016)Story in August'2016:Lenovo teams took over 2 months to fix the issue by replacing the Wireless card. I had a really really hard time in convincingly the Lenovo support teams over phone that the issue is indeed a problem with WiFi card hardware (the traditional Lenovo diagnostic applications such as Lenovo solution center and were not able to even detect the problem). During the course of the issue, 4 times Lenovo team had shipped wrong replacement hardware and each such instance took almost 3 hours of troubleshooting which came as by-product while the replacement part was faulty or incompatible with my Laptop.Story in April'2017:This time fortunately, Lenovo support agreed about the WiFi card replacement in the first attempt itself. They even send the replacement hardware in just 2 days (though it came out to be incompatible with my Laptop). Thereafter, it has been 3 weeks since then and there is no progress on this case. I have had called Lenovo helpline numerous times asking for status update and in response [email protected] support gave me commitments about case escalations and the resolution time of next 3 days. But every single time deadline which was committed to me did surpassed without any progress and still customer care keeps giving me same scripted answers.Additionally... Read more

Read other answers
RELEVANCY SCORE 42

I was hoping someone here might have a corporate number where I can contact a customer service manager or someone higher than that.  I am currently getting the runaround on a replacement laptop and no one will return my calls or help me with my issue.  The representatives I have talked to refuse to provide me with any type of contact information for anyone that can resolve the issue. Thanks!James

Read other answers
RELEVANCY SCORE 41.2

                  Am facing  use with my windows activation on Lenovo Thinkpad L 440 laptop after doing the factory reset, when i have called Lenovo support center they were asking me to purchase new recovery disk of costing $70 + tax or Annual maintenance fee of $199 + tax to get this issue fixed. But this is very much unfair of asking this much amount of money from customer even after paying for getting Windows 8 on our system during the time of purchase of Laptop. Any one knows the escalation matrix for getting this issue resolved. Please help me out on this regard. Thanks,Prabhu

Read other answers
RELEVANCY SCORE 41.2

hello , yes .Same problem!My case manager M never replies to my emails or voicemails and had not been helpful at all through this process of a 'second depot repair'.heres my information .Service Request: 8007254140 Service Order: 7023592722 Serial Number: CB20604229 Part NumberPart DescriptionEstimated Availability Date 90204918  PIWG1 MB LED Sponge 7/29/2016 a confirmation email for deliveray and statues .We received your G780 i7 3632QM 1TB/5400 8G W8MM machine at the Depot Facility on 6/30/16. We?d like to apologize that the repair is taking longer than usual due to parts availability. Nonetheless, below is the estimated date on when we will receive the part. As soon as we receive it, it will take additional 7 Business Days for us to ship back your machine. I recieved just 1 email stating this ,Your Lenovo escalation (case number 02418803) has been assigned to your Customer Care Case Manager. They will be reaching out to you within the next business day. And then this 1 email from the case manager .and no other emails /contacts since from him .Hello Robert,I do want to apologize for the late reply. I have sent internal note to check on status of your repair? I do want to ask if you paid for the repair? As we are showing that your machine went out of warranty on 6/22/2014. Please reply back with any information directly to this email. Thank You...HaCase Manager,Lenovo Customer CareNorth America I  r... Read more

Read other answers
RELEVANCY SCORE 41.2

Could someone help me with the organisation structure at Dell Support India? I am guessing there are going to be levels of customer support, starting with a base team then an escalation team, right? Who do you write to if you are not satisfied with the DELL customer care Team?

A:need some help on escalation process with dell customer care team

Post the NON-technical part of your issue in the USA Customer Care Forum, assuming you are a USA customer.

Read other 1 answers
RELEVANCY SCORE 41.2

Just another sap who bought the Y50-70 Touch. I'm six months out of warranty, and the left hinge has separated from the lid/locked in place. I can't close the lid for fear of damaging the screen, too, so this isn't much of a laptop any more. Never taken it out of the house, but now it's not an option at all - no way to travel with the thing open all the time.I've flipped through the earlier posts on this. Saw how common it was, and how Lenovo was refusing to cover it under warranty at first. After finally investigating it, they changed their tune... for those under warranty. That implies to me that they know they're at fault for the issue, that they shipped a product to customers later found to be defective.I've been extremely careful with this laptop. It's never left the house and mostly just moves from a side table to my lap <2 feet away. Never dropped or anything. When I first got it, I'd hear this cracking sound sometimes when opening the lid, but I thought it was just from the newness and it'd relax. Would just open it really carefully. With how I use it, the machine made it this long - unfortunately past the warranty ending. It's like being penalized because of my caution.So far, no help from customer support. I've had my case escalated once. The second person I spoke to said it was Lenovo's final decision to not fix my laptop. I tried reasoning a bit, suggesting that it'd be an acceptable solution for them to send me the parts free of charge for me to install myself... Read more

Read other answers