Количество 4
Количество 4

CVE-2019-1044
A security feature bypass vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory. To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system. An attacker who successfully exploited the vulnerability could violate virtual trust levels (VTL). The update addresses the vulnerability by correcting how Windows Secure Kernel Mode handles objects in memory to properly enforce VTLs.

CVE-2019-1044
Windows Secure Kernel Mode Security Feature Bypass Vulnerability
GHSA-7q9v-9pcr-vqfv
A security feature bypass vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory.To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system, aka 'Windows Secure Kernel Mode Security Feature Bypass Vulnerability'.

BDU:2019-02159
Уязвимость механизма Windows Secure Kernel Mode операционных систем Windows, позволяющая нарушителю вызвать некорректое применение виртуальных уровней доверия
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2019-1044 A security feature bypass vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory. To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system. An attacker who successfully exploited the vulnerability could violate virtual trust levels (VTL). The update addresses the vulnerability by correcting how Windows Secure Kernel Mode handles objects in memory to properly enforce VTLs. | CVSS3: 5.3 | 0% Низкий | около 6 лет назад |
![]() | CVE-2019-1044 Windows Secure Kernel Mode Security Feature Bypass Vulnerability | CVSS3: 5.3 | 0% Низкий | около 6 лет назад |
GHSA-7q9v-9pcr-vqfv A security feature bypass vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory.To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system, aka 'Windows Secure Kernel Mode Security Feature Bypass Vulnerability'. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2019-02159 Уязвимость механизма Windows Secure Kernel Mode операционных систем Windows, позволяющая нарушителю вызвать некорректое применение виртуальных уровней доверия | CVSS3: 7.8 | 0% Низкий | около 6 лет назад |
Уязвимостей на страницу