Vulnerability Details : CVE-2019-1211
An elevation of privilege vulnerability exists in Git for Visual Studio when it improperly parses configuration files. An attacker who successfully exploited the vulnerability could execute code in the context of another local user.
To exploit the vulnerability, an authenticated attacker would need to modify Git configuration files on a system prior to a full installation of the application. The attacker would then need to convince another user on the system to execute specific Git commands.
The update addresses the issue by changing the permissions required to edit configuration files.
Vulnerability category: Execute codeGain privilege
Products affected by CVE-2019-1211
- cpe:2.3:a:microsoft:visual_studio_2017:-:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visual_studio_2017:15.9:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visual_studio_2019:16.0:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:visual_studio_2019:16.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-1211
0.07%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 30 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-1211
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.7
|
LOW | AV:L/AC:H/Au:N/C:P/I:P/A:P |
1.9
|
6.4
|
NIST | |
7.3
|
HIGH | CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
1.3
|
5.9
|
NIST |
References for CVE-2019-1211
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1211
CVE-2019-1211 | Git for Visual Studio Elevation of Privilege VulnerabilityPatch;Vendor Advisory
Jump to