An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2019-1069 | patch vendor advisory |
https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html | exploit third party advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1069 | patch vendor advisory |
https://www.kb.cert.org/vuls/id/119704 | third party advisory us government resource |