Description
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2000-0196 | The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T05:05:54.210Z
Reserved: 2000-03-22T00:00:00.000Z
Link: CVE-2000-0197
No data.
Status : Modified
Published: 2000-02-14T05:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2000-0197
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD