An elevation of privilege vulnerability exists when the Shell infrastructure component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update addresses the vulnerability by correcting the way in which the Shell infrastructure component handles objects in memory and preventing unintended elevation from lower integrity application.
▸ CVE-2024-9999 ◂ Discovered: 12/11/2024 Status: PUBLISHED |
▸ CVE-2024-9997 ◂ Discovered: 29/10/2024 Status: PUBLISHED |
▸ CVE-2024-9996 ◂ Discovered: 29/10/2024 Status: PUBLISHED |
Tags:
CVE-2020-1098 Vulnerability Details