An elevation of privilege vulnerability exists in the way that the wcmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.
To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application.
The security update addresses the vulnerability by ensuring the wcmsvc.dll properly handles objects in memory.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1180 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: microsoft
Published: 2019-08-14T20:55:04
Updated: 2024-05-29T16:50:34.386Z
Reserved: 2018-11-26T00:00:00
Link: CVE-2019-1180
JSON object: View
NVD Information
Status : Modified
Published: 2019-08-14T21:15:16.673
Modified: 2024-05-29T17:16:08.530
Link: CVE-2019-1180
JSON object: View
Redhat Information
No data.
CWE