CVE-2019-0986
EUVD-2019-171712.06.2019, 14:29
An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and delete files or folders of their choosing. The security update addresses the vulnerability by correcting how the Windows User Profile Service handles symlinks.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| microsoft | windows_10 | - |
| microsoft | windows_7 | - |
| microsoft | windows_8.1 | - |
| microsoft | windows_rt_8.1 | - |
| microsoft | windows_server_2008 | - |
| microsoft | windows_server_2012 | - |
| microsoft | windows_server_2016 | - |
| microsoft | windows_server_2019 | - |
𝑥
= Vulnerable software versions
Windows Releases
Platform | Version | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Windows 10 |
| ||||||||||||||
| Windows 7 |
| ||||||||||||||
| Windows 8.1 |
| ||||||||||||||
| Windows RT 8.1 |
| ||||||||||||||
| Windows Server |
| ||||||||||||||
| Windows Server 2008 |
| ||||||||||||||
| Windows Server 2008 R2 |
| ||||||||||||||
| Windows Server 2012 |
| ||||||||||||||
| Windows Server 2012 R2 |
| ||||||||||||||
| Windows Server 2016 |
| ||||||||||||||
| Windows Server 2019 |
|