A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system. To exploit the vulnerability, an attacker could create a specially crafted request, causing Windows to execute arbitrary code with elevated permissions. The security update addresses the vulnerability by correcting how Windows Deployment Services TFTP Server handles objects in memory, aka 'Windows Deployment Services TFTP Server Remote Code Execution Vulnerability'.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0603 | Patch Vendor Advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0603 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0603 - Patch, Vendor Advisory |
Information
Published : 2019-04-08 23:29
Updated : 2024-11-21 04:16
NVD link : CVE-2019-0603
Mitre link : CVE-2019-0603
CVE.ORG link : CVE-2019-0603
JSON object : View
Products Affected
microsoft
- windows_8.1
- windows_10
- windows_7
- windows_server_2019
- windows_rt_8.1
- windows_server_2012
- windows_server_2008
- windows_server_2016
CWE