
=> Successful exploitation of this vulnerability may allow an low privileged attacker to escalate privileges, code execution under high privileges, and information disclosure.Excess heat is a PC’s natural enemy, and gaming systems – with CPUs tending towards higher clock speeds, plus dedicated graphics cards producing extra warmth inside the case – are especially at risk. => Please connect with vendor MSI Afterburner for patch information. Windows: QID flags if vulnerable version found using registry path "HKLM\SOFTWARE\MSI\Afterburner" or "HKLM\SOFTWARE\WOW6432Node\MSI\Afterburner" The driver in Micro-Star MSI Afterburner 4.8 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. => MSI Afterburner is the most used graphics card software that gives you complete control, lets you monitor your hardware in real-time. => Micro-Star MSI Afterburner Privilege Escalation Vulnerability Please address comments about any linked pages to. Further, CVEreport does not endorse any commercial products that may be mentioned on these sites. CVEreport does not necessarily endorse the views expressed, or concur with the facts presented on these sites. There may be other websites that are more appropriate for your purpose. No inferences should be drawn on account of other sites being referenced, or not, from this page. We have provided these links to other websites because they may have information that would be of interest to you.


By selecting these links, you may be leaving CVEreport webspace.
