CVE-2019-0986Link Following in Microsoft Windows 10 Version 1507

CWE-59Link Following4 documents4 sources
Severity
6.3MEDIUMNVD
EPSS
2.3%
top 15.26%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 12
Latest updateMay 24

Description

An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and delete files or folders of their choosing. The security update addresses the v

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:HExploitability: 1.0 | Impact: 5.2

Affected Packages22 packages

CVEListV5microsoft/windows_7_service_pack_16.1.0publication
CVEListV5microsoft/windows_server_2008_service_pack_26.0.6003.0publication+1
CVEListV5microsoft/windows_server_2008_r2_service_pack_16.1.7601.0publication

Patches

🔴Vulnerability Details

2
GHSA
GHSA-c792-8wx7-j3v9: An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile2022-05-24
CVEList
Windows User Profile Service Elevation of Privilege Vulnerability2019-06-12

📋Vendor Advisories

1
Microsoft
Windows User Profile Service Elevation of Privilege Vulnerability2019-06-11
CVE-2019-0986 — Link Following in Microsoft | cvebase