This vulnerability allows local malicious users to create a denial-of-service condition on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Remote Access Connection Manager service. By creating a directory junction, an attacker can abuse the service to create a directory. An attacker can leverage this vulnerability to create a denial-of-service condition on the system.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 10 - |
||
microsoft windows 10 1607 |
||
microsoft windows server 2008 r2 |
||
microsoft windows 7 - |
||
microsoft windows server 2012 r2 |
||
microsoft windows server 2016 - |
||
microsoft windows server 2008 - |
||
microsoft windows 10 20h2 |
||
microsoft windows 10 1809 |
||
microsoft windows 10 1909 |
||
microsoft windows 10 2004 |
||
microsoft windows 8.1 - |
||
microsoft windows rt 8.1 - |
||
microsoft windows server 2016 2004 |
||
microsoft windows server 2012 - |
||
microsoft windows server 2019 - |
||
microsoft windows 10 21h1 |
||
microsoft windows 10 21h2 |
||
microsoft windows 11 - |
||
microsoft windows server 20h2 |
||
microsoft windows server 2022 |