Stack-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition.
<a href="https://linkedin.com/in/jongseongkim">Jongseong Kim (nevul37), SEC-agent team</a>, <a href="https://linkedin.com/in/hwiwonlee">Hwiwon Lee (hwiwonl), SEC-agent team</a>, Gwanhyun Lee, Dongjun Kim, Anonymous, <a href="https://x.com/x0rb1ts">0rb1t</a> with <a href="http://www.0rb1t.top/">None</a>, <a href="https://github.com/qanux">Qanux</a> with None