Schweregrad: : Alto
  Identificador(es) CVE: : CVE-2010-3338
  Data do informe: 11 fevereiro 2011

  Descrição

This security update resolves a vulnerability in Windows Task Scheduler, which could allow elevation of privilege if an attacker is logged on to an affected system and runs a specially crafted application. Only attackers with valid logon credentials may exploit this vulnerability.

More specifically, this update addresses the vulnerability by correcting the way Task Scheduler conducts the integrity checks to validate that tasks run with the intended user privileges.


  Exposição das informações

For information on patches specific to the affected software, please proceed to the Microsoft Web page.


Note for affected software:

* Server Core installation affected. This update applies, with the same severity rating, to supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, whether or not installed using the Server Core installation option. For more information on this installation option.

  Solução

  Software infectado e versão:

  • Windows Vista Service Pack 1 and Windows Vista Service Pack 2
  • Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
  • Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2*
  • Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2*
  • Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2
  • Windows 7 for 32-bit Systems
  • Windows 7 for x64-based Systems
  • Windows Server 2008 R2 for x64-based Systems*
  • Windows Server 2008 R2 for Itanium-based Systems

Arquivo correspondente