Vigil@nce - Windows: privilege elevation via Task Scheduler
November 2010 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/
SYNTHESIS OF THE VULNERABILITY
A local attacker can use a vulnerability of the Task Scheduler, in
order to gain system privileges.
Severity: 2/4
Creation date: 25/10/2010
DESCRIPTION OF THE VULNERABILITY
The Task Scheduler is used to plan the automatic execution of
tasks.
A local attacker can use a malicious XML schema for the Task
Scheduler, in order to gain system privileges.
Technical details are unknown.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Windows-privilege-elevation-via-Task-Scheduler-10069