NT users can gain debug-level access on a system process using the Sechole exploit.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-009 | vendor advisory |
http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ190288 | vendor advisory |