An elevation of privilege exists in the p2pimsvc service where an attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update addresses this vulnerability by correcting how the p2pimsvc service handles processes these requests.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1168 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: microsoft
Published: 2019-08-14T20:55:03
Updated: 2024-05-29T16:50:55.470Z
Reserved: 2018-11-26T00:00:00
Link: CVE-2019-1168
JSON object: View
NVD Information
Status : Modified
Published: 2019-08-14T21:15:15.860
Modified: 2024-05-29T17:16:05.420
Link: CVE-2019-1168
JSON object: View
Redhat Information
No data.
CWE