设为首页收藏本站

周口职业技术学院论坛

 找回密码
 立即注册
搜索
热搜: 活动 交友 discuz
查看: 4457|回复: 0
打印 上一主题 下一主题

Microsoft Windows用户访问控制(UAC)绕过本地权限提升漏洞

[复制链接]

10

主题

0

好友

22

积分

无名的过客

跳转到指定楼层
楼主
发表于 2010-12-4 04:35:54 |只看该作者 |倒序浏览
影响版本:
Microsoft Vista x64 Edition SP2
Microsoft Vista x64 Edition SP1
Microsoft Vista x64 Edition 0
Microsoft Vista Ultimate SP2
Microsoft Vista Ultimate SP1
Microsoft Vista Ultimate 64-bit edition SP2
Microsoft Vista Ultimate 64-bit edition SP1
Microsoft Vista Ultimate 64-bit edition 0
Microsoft Vista Ultimate
Microsoft Vista SP2
Microsoft Vista SP1
Microsoft Vista Home Premium SP2
Microsoft Vista Home Premium SP1
Microsoft Vista Home Premium 64-bit edition SP
Microsoft Vista Home Premium 64-bit edition SP
Microsoft Vista Home Premium 64-bit edition 0
Microsoft Vista Home Premium
Microsoft Vista Home Basic SP2
Microsoft Vista Home Basic SP1
Microsoft Vista Home Basic 64-bit edition Sp2
Microsoft Vista Home Basic 64-bit edition Sp2
Microsoft Vista Home Basic 64-bit edition Sp1
Microsoft Vista Home Basic 64-bit edition Sp1
Microsoft Vista Home Basic 64-bit edition 0
Microsoft Vista Home Basic
Microsoft Vista Enterprise SP2
Microsoft Vista Enterprise SP1
Microsoft Vista Enterprise 64-bit edition SP2
Microsoft Vista Enterprise 64-bit edition SP1
Microsoft Vista Enterprise 64-bit edition 0
Microsoft Vista Enterprise
Microsoft Vista Business SP2
Microsoft Vista Business SP1
Microsoft Vista Business 64-bit edition SP2
Microsoft Vista Business 64-bit edition SP1
Microsoft Vista Business 64-bit edition 0
Microsoft Vista Business
Microsoft Vista 0
Microsoft Server 2008
Microsoft Windows 7

漏洞描述:


Microsoft Windows是微软发布的非常流行的操作系统。

Microsoft Windows实现上存在漏洞,本地攻击攻击者可以利用此漏洞以系统级权限执行任意代码,成功利用漏洞将完全操纵受影响的计算机,利用失败后可能形成拒绝服务。

<*参考
noobpwnftw
*>
测试方法:
noobpwnftw 提供了如下测试方法:
工具测试&教程: LD.zip (457 KB, 下载次数: 1397)
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

手机版|Archiver|周口职业技术学院论坛    

GMT+8, 2024-5-7 17:37 , Processed in 0.705936 second(s), 25 queries .

Powered by Discuz! X2.5

© 2001-2013 Comsenz Inc.| Style by 913TT

!fastreply! 回顶部 !return_list!