An elevation of privilege exists in the p2pimsvc service where an attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update addresses this vulnerability by correcting how the p2pimsvc service handles processes these requests.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1168 | Patch Vendor Advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1168 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1168 - Patch, Vendor Advisory |
29 May 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) An elevation of privilege exists in the p2pimsvc service where an attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the p2pimsvc service handles processes these requests. |
Information
Published : 2019-08-14 21:15
Updated : 2024-11-21 04:36
NVD link : CVE-2019-1168
Mitre link : CVE-2019-1168
CVE.ORG link : CVE-2019-1168
JSON object : View
Products Affected
microsoft
- windows_server_2008
- windows_8.1
- windows_server_2016
- windows_server_2012
- windows_7
- windows_rt_8.1
- windows_server_2019
- windows_10
CWE