Gravité: : Élevé
  Identifiant(s) CVE: : CVE-2010-3338
  Date du conseil: 11 février 2011

  Description

This security update resolves a vulnerability in Windows Task Scheduler, which could allow elevation of privilege if an attacker is logged on to an affected system and runs a specially crafted application. Only attackers with valid logon credentials may exploit this vulnerability.

More specifically, this update addresses the vulnerability by correcting the way Task Scheduler conducts the integrity checks to validate that tasks run with the intended user privileges.


  Information Exposure Rating:

For information on patches specific to the affected software, please proceed to the Microsoft Web page.


Note for affected software:

* Server Core installation affected. This update applies, with the same severity rating, to supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, whether or not installed using the Server Core installation option. For more information on this installation option.

  Solutions

  Affected software and version:

  • Windows Vista Service Pack 1 and Windows Vista Service Pack 2
  • Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2
  • Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2*
  • Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2*
  • Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2
  • Windows 7 for 32-bit Systems
  • Windows 7 for x64-based Systems
  • Windows Server 2008 R2 for x64-based Systems*
  • Windows Server 2008 R2 for Itanium-based Systems