CVE-2019-0841

An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0730, CVE-2019-0731, CVE-2019-0796, CVE-2019-0805, CVE-2019-0836.
References
Link Resource
http://packetstormsecurity.com/files/152463/Microsoft-Windows-AppX-Deployment-Service-Privilege-Escalation.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153009/Internet-Explorer-JavaScript-Privilege-Escalation.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153114/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153215/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153642/AppXSvc-Hard-Link-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0841 Patch Vendor Advisory
https://www.exploit-db.com/exploits/46683/ Exploit Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-19-360/ Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/152463/Microsoft-Windows-AppX-Deployment-Service-Privilege-Escalation.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153009/Internet-Explorer-JavaScript-Privilege-Escalation.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153114/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153215/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/153642/AppXSvc-Hard-Link-Privilege-Escalation.html Exploit Third Party Advisory VDB Entry
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0841 Patch Vendor Advisory
https://www.exploit-db.com/exploits/46683/ Exploit Third Party Advisory VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-19-360/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_10_1703:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1709:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:17

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/152463/Microsoft-Windows-AppX-Deployment-Service-Privilege-Escalation.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/152463/Microsoft-Windows-AppX-Deployment-Service-Privilege-Escalation.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/153009/Internet-Explorer-JavaScript-Privilege-Escalation.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/153009/Internet-Explorer-JavaScript-Privilege-Escalation.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/153114/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/153114/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/153215/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/153215/Microsoft-Windows-AppX-Deployment-Service-Local-Privilege-Escalation.html - Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/153642/AppXSvc-Hard-Link-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/153642/AppXSvc-Hard-Link-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0841 - Patch, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0841 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/46683/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/46683/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.zerodayinitiative.com/advisories/ZDI-19-360/ - Third Party Advisory, VDB Entry () https://www.zerodayinitiative.com/advisories/ZDI-19-360/ - Third Party Advisory, VDB Entry

Information

Published : 2019-04-09 21:29

Updated : 2024-11-21 04:17


NVD link : CVE-2019-0841

Mitre link : CVE-2019-0841

CVE.ORG link : CVE-2019-0841


JSON object : View

Products Affected

microsoft

  • windows_server_2016
  • windows_10_1803
  • windows_10_1709
  • windows_10_1703
  • windows_10_1809
  • windows_server_2019
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')