|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Windows: privilege escalation via Task Scheduler
Synthesis of the vulnerability
A local attacker can use the Task Scheduler of Windows, in order to escalate his privileges.
Impacted software: Windows 2008 R2, Windows 7.
Severity of this computer vulnerability: 2/4.
Consequences of an attack: administrator access/rights, privileged access/rights.
Attacker's origin: user shell.
Creation date: 14/04/2015.
Références of this announce: 3046269, CERTFR-2015-AVI-155, CVE-2015-0098, MS15-037, VIGILANCE-VUL-16600.
Description of the vulnerability
The Task Scheduler service of Windows runs programmed commands.
However, an attacker can use an invalid task present on some systems, in order to execute code with System privileges.
A local attacker can therefore use the Task Scheduler of Windows, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a system vulnerability bulletin. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.