An attacker with access to a target computer could exploit this vulnerability to elevate privileges and take control of the computer. To exploit the vulnerability, the attacker could send specially crafted SMB messages to the Windows Search service. An attacker could then install programs view, change, or delete data or create new accounts with full user rights. An attacker who successfully exploited this vulnerability could take control of the affected system. A remote code execution vulnerability exists when Windows Search handles objects in memory.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |