vulnerability
Microsoft CVE-2019-1142: .NET Framework Elevation of Privilege Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:N/I:P/A:N) | Sep 10, 2019 | Sep 10, 2019 | Jan 31, 2023 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:P/A:N)
Published
Sep 10, 2019
Added
Sep 10, 2019
Modified
Jan 31, 2023
Description
An elevation of privilege vulnerability exists when the .NET Framework common language runtime (CLR) allows file creation in arbitrary locations. An attacker who successfully exploited this vulnerability could write files to folders that require higher privileges than what the attacker already has.
To exploit the vulnerability, an attacker would need to log into a system. The attacker could then specify the targeted folder and trigger an affected process to run.
The update addresses the vulnerability correcting how the .NET Framework CLR process logs data.
Solutions
msft-kb4514330-0684bce0-5705-4bdd-b17e-5785f339752amsft-kb4514330-25c585d2-0d3d-427b-8e9c-4b0c6530c097msft-kb4514330-26abdbea-d88f-4474-9dba-e1114d8c9f33msft-kb4514331-0b79e1f3-38a5-4ce2-8e09-c18d679ea018msft-kb4514331-deceb442-c8de-4a89-8a17-ca1f5ac28c42msft-kb4514337-7aaae666-f0f1-49cb-8769-2b8138468fddmsft-kb4514337-8069e2e2-dcfc-46ab-a144-c1f3de732084msft-kb4514337-f4921c13-89fa-4713-9387-a9efd45207d9msft-kb4514338-007d5809-9642-45ad-bcc6-144b61866ed5msft-kb4514338-7dd9b2c5-8dd2-45ec-b56f-d2c104690046msft-kb4514341-367c143d-1358-4f34-8592-4365f9661ecfmsft-kb4514341-cfb5d834-8865-42cf-8c73-16e12c441b4bmsft-kb4514342-5bf9b7e9-8ca4-4071-be38-32b8b0bd1b14msft-kb4514342-9c35db79-cff7-43f8-8347-d840247fc327msft-kb4514342-adaeaf33-5dea-4678-b31b-ba22e421354bmsft-kb4514349-360a8cac-e25d-43fa-838b-92e9e577746dmsft-kb4514349-8a2a9c07-b63e-4997-8b12-dc11f5322849msft-kb4514349-8f4dfcfb-9976-42e5-93f4-7e4a3423cb99msft-kb4514350-547e4523-2b99-49af-9afa-fe098ea63beemsft-kb4514350-7c35c2b2-3a08-4477-8451-36b91d2f106amsft-kb4514354-197fe842-d05f-4d2d-965c-f88128ec20a2msft-kb4514354-4a142313-e490-4615-801a-502412fe5a70msft-kb4514354-59135f63-79f7-434a-991f-5c16581e50b6msft-kb4514355-486004a4-5201-4fb0-bc90-6efb6e4d49f3msft-kb4514355-97ede33d-892a-4509-8da6-1fc6f820b5f4msft-kb4514356-2f10965d-9165-46a2-9754-5fe708ae13dbmsft-kb4514356-fe2f1375-8bfb-400d-9176-dddc6d0386a6msft-kb4514357-2f192572-e94f-47a9-ba5d-090bae1c70a0msft-kb4514357-909203a9-3703-41b7-af63-efc31496314amsft-kb4514357-f78f3f47-8e55-4b36-889c-96fb892f9e10msft-kb4514358-31e70932-59fb-4632-bc84-4561acb4a38amsft-kb4514358-358a7321-ff80-4728-a5a1-67962dd3ed80msft-kb4514358-cb5815a6-fced-4dd1-896d-372c53de4ecbmsft-kb4514359-6200f0f4-25ee-4b49-a439-8b196ae48a51msft-kb4514359-846e1104-f40e-4ca3-9f2f-445f0eda6b20msft-kb4514359-f01db03f-d4c5-47e1-8b25-7606d1921463msft-kb4514366-65dea5a6-f7bf-4888-be38-9b0a2da57e1amsft-kb4514366-b0b3bf68-7807-470c-9d95-3d1e31f516c0msft-kb4514366-d6675726-7ed4-4397-81f3-5de1e602f290msft-kb4516044-4d387cda-6491-4775-9f86-ec445694daf6msft-kb4516044-5743683a-0751-4f47-a0a5-54186af17be5microsoft-windows-windows_server_2016-1607-kb4516044msft-kb4516058-4d1b0989-a12b-4062-9692-ada2a53833aamsft-kb4516058-f2bdd1f1-8f8f-429b-b798-905b82bdf629msft-kb4516066-92c6450f-2320-49f6-8bd9-0b61c9e10976msft-kb4516066-ad42679f-7ae5-4e30-818f-ec14d19718a1msft-kb4516068-117fb78f-b0ad-4ba3-a5aa-8cc9dad2be7dmsft-kb4516068-568e1bb0-2cd4-4521-8b07-fc5be5bcb391msft-kb4516070-085d342e-1c92-4caa-947f-b7a896b93004msft-kb4516070-106c21bb-e967-4b37-8806-00a071bd3198
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.