Exploit Published for Unpatched Flaw in Windows Task Scheduler
Credit:
Bleeping Computer
A security researcher has published on Twitter details about a vulnerability in the Windows OS.
The vulnerability is a "local privilege escalation" issue that allows an attacker to elevate the access of malicious code from a limited USER role to an all-access SYSTEM account.
Will Dormann, an engineer of CERT/CC, has confirmed the vulnerability and has issued an official CERT/CC alert last night. Dormann says the vulnerability resides in the Windows Task Scheduler, and more precisely in the Advanced Local Procedure Call (ALPC) interface.