Уязвимость удаленного выполнения кода в Windows Deployment Services TFTP Server из-за некорректной обработки объектов в памяти
Описание
Злоумышленник, успешно эксплуатировавший уязвимость, способен запустить произвольный код с повышенным уровнем доступа на целевой системе.
Условия эксплуатации
Для эксплуатации уязвимости злоумышленник может создать специально сформированный запрос, заставляя Windows выполнять произвольный код с повышенным уровнем доступа.
Решение
Обновление безопасности устраняет уязвимость путем исправления того, как Windows Deployment Services TFTP Server обрабатывает объекты в памяти.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2008 for Itanium-Based Systems Service Pack 2 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | ||
Windows 7 for 32-bit Systems Service Pack 1 | ||
Windows 7 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1 | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
Older Software Release
DOS
EPSS
7.5 High
CVSS3
Связанные уязвимости
A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system. To exploit the vulnerability, an attacker could create a specially crafted request, causing Windows to execute arbitrary code with elevated permissions. The security update addresses the vulnerability by correcting how Windows Deployment Services TFTP Server handles objects in memory, aka 'Windows Deployment Services TFTP Server Remote Code Execution Vulnerability'.
A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system. To exploit the vulnerability, an attacker could create a specially crafted request, causing Windows to execute arbitrary code with elevated permissions. The security update addresses the vulnerability by correcting how Windows Deployment Services TFTP Server handles objects in memory, aka 'Windows Deployment Services TFTP Server Remote Code Execution Vulnerability'.
Уязвимость компонента TFTP Server службы развертывания Windows Deployment Services операционных систем Windows, позволяющая нарушителю выполнить произвольный код
EPSS
7.5 High
CVSS3