vulnerability

Microsoft CVE-2019-1142: .NET Framework Elevation of Privilege Vulnerability

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:P/A:N)
Published
Sep 10, 2019
Added
Sep 10, 2019
Modified
Jan 31, 2023

Description

An elevation of privilege vulnerability exists when the .NET Framework common language runtime (CLR) allows file creation in arbitrary locations. An attacker who successfully exploited this vulnerability could write files to folders that require higher privileges than what the attacker already has.
To exploit the vulnerability, an attacker would need to log into a system. The attacker could then specify the targeted folder and trigger an affected process to run.
The update addresses the vulnerability correcting how the .NET Framework CLR process logs data.

Solutions

msft-kb4514330-0684bce0-5705-4bdd-b17e-5785f339752amsft-kb4514330-25c585d2-0d3d-427b-8e9c-4b0c6530c097msft-kb4514330-26abdbea-d88f-4474-9dba-e1114d8c9f33msft-kb4514331-0b79e1f3-38a5-4ce2-8e09-c18d679ea018msft-kb4514331-deceb442-c8de-4a89-8a17-ca1f5ac28c42msft-kb4514337-7aaae666-f0f1-49cb-8769-2b8138468fddmsft-kb4514337-8069e2e2-dcfc-46ab-a144-c1f3de732084msft-kb4514337-f4921c13-89fa-4713-9387-a9efd45207d9msft-kb4514338-007d5809-9642-45ad-bcc6-144b61866ed5msft-kb4514338-7dd9b2c5-8dd2-45ec-b56f-d2c104690046msft-kb4514341-367c143d-1358-4f34-8592-4365f9661ecfmsft-kb4514341-cfb5d834-8865-42cf-8c73-16e12c441b4bmsft-kb4514342-5bf9b7e9-8ca4-4071-be38-32b8b0bd1b14msft-kb4514342-9c35db79-cff7-43f8-8347-d840247fc327msft-kb4514342-adaeaf33-5dea-4678-b31b-ba22e421354bmsft-kb4514349-360a8cac-e25d-43fa-838b-92e9e577746dmsft-kb4514349-8a2a9c07-b63e-4997-8b12-dc11f5322849msft-kb4514349-8f4dfcfb-9976-42e5-93f4-7e4a3423cb99msft-kb4514350-547e4523-2b99-49af-9afa-fe098ea63beemsft-kb4514350-7c35c2b2-3a08-4477-8451-36b91d2f106amsft-kb4514354-197fe842-d05f-4d2d-965c-f88128ec20a2msft-kb4514354-4a142313-e490-4615-801a-502412fe5a70msft-kb4514354-59135f63-79f7-434a-991f-5c16581e50b6msft-kb4514355-486004a4-5201-4fb0-bc90-6efb6e4d49f3msft-kb4514355-97ede33d-892a-4509-8da6-1fc6f820b5f4msft-kb4514356-2f10965d-9165-46a2-9754-5fe708ae13dbmsft-kb4514356-fe2f1375-8bfb-400d-9176-dddc6d0386a6msft-kb4514357-2f192572-e94f-47a9-ba5d-090bae1c70a0msft-kb4514357-909203a9-3703-41b7-af63-efc31496314amsft-kb4514357-f78f3f47-8e55-4b36-889c-96fb892f9e10msft-kb4514358-31e70932-59fb-4632-bc84-4561acb4a38amsft-kb4514358-358a7321-ff80-4728-a5a1-67962dd3ed80msft-kb4514358-cb5815a6-fced-4dd1-896d-372c53de4ecbmsft-kb4514359-6200f0f4-25ee-4b49-a439-8b196ae48a51msft-kb4514359-846e1104-f40e-4ca3-9f2f-445f0eda6b20msft-kb4514359-f01db03f-d4c5-47e1-8b25-7606d1921463msft-kb4514366-65dea5a6-f7bf-4888-be38-9b0a2da57e1amsft-kb4514366-b0b3bf68-7807-470c-9d95-3d1e31f516c0msft-kb4514366-d6675726-7ed4-4397-81f3-5de1e602f290msft-kb4516044-4d387cda-6491-4775-9f86-ec445694daf6msft-kb4516044-5743683a-0751-4f47-a0a5-54186af17be5microsoft-windows-windows_server_2016-1607-kb4516044msft-kb4516058-4d1b0989-a12b-4062-9692-ada2a53833aamsft-kb4516058-f2bdd1f1-8f8f-429b-b798-905b82bdf629msft-kb4516066-92c6450f-2320-49f6-8bd9-0b61c9e10976msft-kb4516066-ad42679f-7ae5-4e30-818f-ec14d19718a1msft-kb4516068-117fb78f-b0ad-4ba3-a5aa-8cc9dad2be7dmsft-kb4516068-568e1bb0-2cd4-4521-8b07-fc5be5bcb391msft-kb4516070-085d342e-1c92-4caa-947f-b7a896b93004msft-kb4516070-106c21bb-e967-4b37-8806-00a071bd3198

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.