First published: Wed Aug 14 2019(Updated: )
An elevation of privilege vulnerability exists in Git for Visual Studio when it improperly parses configuration files, aka 'Git for Visual Studio Elevation of Privilege Vulnerability'.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Visual Studio Professional 2017 | ||
Visual Studio Professional 2017 | =15.9 | |
Visual Studio Professional 2019 | =16.0 | |
Visual Studio Professional 2019 | =16.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1211 has a severity rating of Important, indicating a potential impact on user privileges.
To fix CVE-2019-1211, update Git for Visual Studio to the latest version provided by Microsoft.
CVE-2019-1211 affects Microsoft Visual Studio 2017 and 2019, specifically versions 15.9 and 16.0 to 16.2.
CVE-2019-1211 is classified as an elevation of privilege vulnerability.
CVE-2019-1211 exploits the system by improperly parsing configuration files, which can lead to unauthorized actions.