Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrated by TAPI Server, SQL Server, and IIS processes, and related to the Windows Service Isolation feature. NOTE: the vendor states that privilege escalation from NetworkService to LocalSystem does not cross a "security boundary."
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: microsoft
Published: 2010-08-16T18:25:00Z
Updated: 2024-09-16T20:36:20.103Z
Reserved: 2010-05-11T00:00:00Z
Link: CVE-2010-1886
Vulnrichment
No data.
NVD
Status : Modified
Published: 2010-08-16T18:39:40.560
Modified: 2024-11-21T01:15:23.887
Link: CVE-2010-1886
Redhat
No data.