www.cve.org Open in urlscan Pro
99.86.4.15  Public Scan

URL: https://www.cve.org/CVERecord?id=CVE-2019-1315
Submission: On December 09 via api from BY — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

We're sorry but the CVE Website doesn't work properly without JavaScript
enabled. Please enable it to continue.
Skip to main content
About
OverviewHistoryProcessRelated EffortsMetrics
Partner Information
PartnerList of Partners
Program Organization
StructureProgram Relationship with PartnersBoardWorking GroupsCVE Numbering
AuthoritiesAuthorized Data Publishers
Downloads
Resources & Support
ResourcesGlossaryFAQs
AllRecentArchivesNewsletter Sign-Up
Reserve IDs & Publish RecordsCVE Services

Report/Request
CNAsNon-CNAs
Site Search
Find
Find CVE Records by keyword on cve.mitre.org.
Site Search


CVE-2019-1315

PUBLISHED

external site

View JSON
|

external site

User Guide

--------------------------------------------------------------------------------

Collapse all


REQUIRED CVE RECORD INFORMATION


CNA: MICROSOFT CORPORATION

expand

Published: 2019-10-10
Updated: 2019-10-10

DESCRIPTION

An elevation of privilege vulnerability exists when Windows Error Reporting
manager improperly handles hard links, aka 'Windows Error Reporting Manager
Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1339,
CVE-2019-1342.



PRODUCT STATUS

Learn more

Vendor

Microsoft

Product

Windows

Versions 20 Total

Default Status: unknown

affected

 * affected at 7 for 32-bit Systems Service Pack 1 

 * affected at 7 for x64-based Systems Service Pack 1 

 * affected at 8.1 for 32-bit systems 

 * affected at 8.1 for x64-based systems 

 * affected at RT 8.1 

 * affected at 10 for 32-bit Systems 

 * affected at 10 for x64-based Systems 

 * affected at 10 Version 1607 for 32-bit Systems 

 * affected at 10 Version 1607 for x64-based Systems 

 * affected at 10 Version 1703 for 32-bit Systems 

 * affected at 10 Version 1703 for x64-based Systems 

 * affected at 10 Version 1709 for 32-bit Systems 

 * affected at 10 Version 1709 for x64-based Systems 

 * affected at 10 Version 1803 for 32-bit Systems 

 * affected at 10 Version 1803 for x64-based Systems 

 * affected at 10 Version 1803 for ARM64-based Systems 

 * affected at 10 Version 1809 for 32-bit Systems 

 * affected at 10 Version 1809 for x64-based Systems 

 * affected at 10 Version 1809 for ARM64-based Systems 

 * affected at 10 Version 1709 for ARM64-based Systems 

Vendor

Microsoft

Product

Windows Server

Versions 17 Total

Default Status: unknown

affected

 * affected at 2008 R2 for x64-based Systems Service Pack 1 (Core installation) 

 * affected at 2008 R2 for Itanium-Based Systems Service Pack 1 

 * affected at 2008 R2 for x64-based Systems Service Pack 1 

 * affected at 2008 for 32-bit Systems Service Pack 2 (Core installation) 

 * affected at 2012 

 * affected at 2012 (Core installation) 

 * affected at 2012 R2 

 * affected at 2012 R2 (Core installation) 

 * affected at 2016 

 * affected at 2016 (Core installation) 

 * affected at version 1803 (Core Installation) 

 * affected at 2019 

 * affected at 2019 (Core installation) 

 * affected at 2008 for Itanium-Based Systems Service Pack 2 

 * affected at 2008 for 32-bit Systems Service Pack 2 

 * affected at 2008 for x64-based Systems Service Pack 2 

 * affected at 2008 for x64-based Systems Service Pack 2 (Core installation) 

Vendor

Microsoft

Product

Windows 10 Version 1903 for 32-bit Systems

Versions 1 Total

Default Status: unknown

affected

 * affected at unspecified 

Vendor

Microsoft

Product

Windows 10 Version 1903 for x64-based Systems

Versions 1 Total

Default Status: unknown

affected

 * affected at unspecified 

Vendor

Microsoft

Product

Windows 10 Version 1903 for ARM64-based Systems

Versions 1 Total

Default Status: unknown

affected

 * affected at unspecified 

Vendor

Microsoft

Product

Windows Server, version 1903 (Server Core installation)

Versions 1 Total

Default Status: unknown

affected

 * affected at unspecified 

REFERENCES 1 TOTAL

 * https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1315
   
   external site


CVE PROGRAM

expand

Updated: 2024-08-04

This container includes required additional information provided by the CVE
Program for this vulnerability.

REFERENCES 1 TOTAL

 * https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1315
   
   external site
   
   x_transferred

On this page

 * Required CVE Record Information
   * CNA: Microsoft Corporation
   * CVE Program

POLICIES & COOKIES

 * Terms of Use
 * Website Security Policy
 * Privacy Policy
 * Cookie Notice
 * Manage Cookies

MEDIA

 * News
 * Blogs
 * Podcasts
 * Email newsletter sign up

SOCIAL MEDIA

github

linkedin

bluesky

mastodon

youtube

medium

x-twitter icon for @CVEnew

New CVE Records

x-twitter icon for @CVEannounce

CVE Announce

CONTACT

 * CVE Program Support
   
   external site

 * CNA Partners
 * CVE Website Support
   
   external site

 * CVE Program Idea Tracker
   
   external site

Use of the CVE® List and the associated references from this website are subject
to the terms of use. CVE is sponsored by the U.S. Department of Homeland
Security (DHS)

external link

Cybersecurity and Infrastructure Security Agency (CISA)

external link

. Copyright © 1999-2024, The MITRE Corporation

external link

. CVE and the CVE logo are registered trademarks of The MITRE Corporation.