Описание
Windows Workstation Service Elevation of Privilege Vulnerability
FAQ
What privileges could be gained by an attacker who successfully exploited this vulnerability?
If successfully exploited, this vulnerability could case attacker-controlled data on the heap to overwrite critical structures of the service, leading to arbitrary memory write or control flow hijacking, resulting in privilege escalation
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2012 | ||
Windows Server 2012 (Server Core installation) | ||
Windows Server 2012 R2 | ||
Windows Server 2012 R2 (Server Core installation) | ||
Windows 10 for 32-bit Systems | ||
Windows 10 for x64-based Systems | ||
Windows Server 2016 | ||
Windows 10 Version 1607 for 32-bit Systems |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 65%
0.00507
Низкий
7.8 High
CVSS3
Связанные уязвимости
CVSS3: 7.8
nvd
12 месяцев назад
Windows Workstation Service Elevation of Privilege Vulnerability
CVSS3: 7.8
github
12 месяцев назад
Windows Workstation Service Elevation of Privilege Vulnerability
CVSS3: 7.8
fstec
12 месяцев назад
Уязвимость службы Workstation Service операционных систем Windows, позволяющая нарушителю повысить свои привилегии
EPSS
Процентиль: 65%
0.00507
Низкий
7.8 High
CVSS3