An elevation of privilege vulnerability exists in the way that the rpcss.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerability by ensuring the rpcss.dll properly handles objects in memory.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1177 | Patch Vendor Advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1177 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1177 - Patch, Vendor Advisory |
03 Jul 2024, 01:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-269 |
29 May 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.0 |
Summary | (en) An elevation of privilege vulnerability exists in the way that the rpcss.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the rpcss.dll properly handles objects in memory. |
Information
Published : 2019-08-14 21:15
Updated : 2024-11-21 04:36
NVD link : CVE-2019-1177
Mitre link : CVE-2019-1177
CVE.ORG link : CVE-2019-1177
JSON object : View
Products Affected
microsoft
- windows_server_2008
- windows_8.1
- windows_server_2016
- windows_server_2012
- windows_7
- windows_rt_8.1
- windows_server_2019
- windows_10
CWE