The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows nt 4.0 |