| Vulnerability Name: | CCN-62737 | ||||||
| Published: | 2010-10-22 | ||||||
| Updated: | 2010-10-22 | ||||||
| Summary: | Microsoft Windows could allow a local attacker to gain elevated privileges on the system, caused by the failure to prevent users from modifying specific fields by the Task Scheduler service. An attacker could exploit this vulnerability using the Component Object Model (COM) interface to bypass the CRC32 integrity checks to manipulate an XML file and execute arbitrary code on the system with SYSTEM level privileges. | ||||||
| CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||
| CVSS v2 Severity: | 7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C) 5.3 Medium (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||
| Vulnerability Consequences: | Gain Privileges | ||||||
| References: | Source: CCN Type: Microsoft Web site Microsoft Windows Source: XF Type: UNKNOWN ms-win-scheduler-privilege-escalation(62737) | ||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||