SandboxEscaper demonstrated exploiting this vulnerability with a malicious .JOB file.
According to 0patch experts, only previous versions of schtasks.exe can be used to increase privileges in the system. The current Task Scheduler will require user to modify task file in order to have access to make changes in this file.
«Our analysis revealed that the problem affects only past versions of schtasks.exe. It is possible that older versions of schtasks.exe did not directly call _SchSetRpcSecurity<, but other RPC functions, which led to a call to _SchSetRpcSecurity using RPC», — write 0patch experts.
Researchers released a micropatch that is available for Windows systems running the 0patch Agent.
To install the 0patch Agent you need to register on the official website.
The patch from 0patch is suitable for Windows 10 version 1809 x86, Windows 10 version 1809 x64, Windows Server 2019.
Recall that SandboxEscaper has also published a number of exploits for vulnerabilities in Microsoft products. This time, security concerns affect the Windows component and the Internet Explorer 11 browser.
Source: https://blog.0patch.com
About Himalayaview.top Himalayaview.top pop-ups can not launch out of the blue. If you have actually…
About Youdilgad.top Youdilgad.top pop-ups can not expose out of the blue. If you have clicked…
About Alkads.com Alkads.com pop-ups can not launch out of the blue. If you have clicked…
About Bigamirt.xyz Bigamirt.xyz pop-ups can not launch out of nowhere. If you have clicked some…
About Micorban.xyz Micorban.xyz pop-ups can not open out of the blue. If you have actually…
About Msdefender.co.in Msdefender.co.in pop-ups can not expose out of the blue. If you have actually…