![]() ![]() ![]() Microsoft Windows Server 2008 R2 SP1 Itaniumġ.Microsoft Windows Server 2008 R2 SP1 圆4.Microsoft Windows Server 2008 SP2 Itanium.By executing a specially-crafted program, an authenticated attacker could exploit this vulnerability to execute arbitrary code as an administrator and take control of the system. Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by improper sanitization of handles in memory by the Secondary Logon Service.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |