Title: Microsoft Windows on 32-bit Task Scheduler Crafted Application Local Privilege Escalation
Sep 13, 2010
Oct 12, 2010
Microsoft Windows contains a flaw that may allow an attacker to gain access to unauthorized privileges. The issue is caused due to the Windows Task Scheduler failing to properly determine certain scheduled tasks' security context. This may be exploited by malicious, local, context-dependent attackers to gain escalated privileges via a crafted application.
Local Access Required,
Loss of Integrity
Patch / RCS
Discovered in the Wild
Currently, there are no known workarounds or upgrades to correct this issue. However, Microsoft has released a patch to address this vulnerability. Check the vendor advisory or solution in the references section.