Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Conversation

Notices

  1. packetcat (staticsafe@mastodon.zombocloud.com)'s status on Wednesday, 07-Aug-2019 19:04:39 EDT packetcat packetcat

    Severe local 0-Day escalation exploit found in Steam Client Services

    "Earlier today, disgruntled security researcher Vasily Kravets released a zero-day vulnerability in the Windows version of the ubiquitous gaming service Steam. The vulnerability allows any user to run arbitrary code with LOCALSYSTEM privileges using just a very few simple commands."

    https://arstechnica.com/gaming/2019/08/severe-local-0-day-escalation-exploit-found-in-steam-client-services/

    #infosec

    In conversation Wednesday, 07-Aug-2019 19:04:39 EDT from mastodon.zombocloud.com permalink

    Attachments

    1. Severe local 0-Day escalation exploit found in Steam Client Services
      from Ars Technica
      This trivially exploited security flaw allows any user root—er, LOCALSYSTEM—privileges.
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.