An elevation of privilege vulnerability exists in the way that the rpcss.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the rpcss.dll properly handles objects in memory.
2019-08-14T21:15:16.453
2024-11-21T04:36:10.993
Modified
CVSSv3.1: 7.0 (HIGH)
AV:L/AC:L/Au:N/C:P/I:P/A:P
3.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_10 | - | Yes |
Operating System | microsoft | windows_10 | 1607 | Yes |
Operating System | microsoft | windows_10 | 1703 | Yes |
Operating System | microsoft | windows_10 | 1709 | Yes |
Operating System | microsoft | windows_10 | 1803 | Yes |
Operating System | microsoft | windows_10 | 1809 | Yes |
Operating System | microsoft | windows_10 | 1903 | Yes |
Operating System | microsoft | windows_7 | - | Yes |
Operating System | microsoft | windows_8.1 | - | Yes |
Operating System | microsoft | windows_rt_8.1 | - | Yes |
Operating System | microsoft | windows_server_2008 | - | Yes |
Operating System | microsoft | windows_server_2012 | - | Yes |
Operating System | microsoft | windows_server_2012 | r2 | Yes |
Operating System | microsoft | windows_server_2016 | - | Yes |
Operating System | microsoft | windows_server_2016 | 1803 | Yes |
Operating System | microsoft | windows_server_2016 | 1903 | Yes |
Operating System | microsoft | windows_server_2019 | - | Yes |