Attackers can exploit this issue to execute arbitrary code with kernel privileges, facilitating the complete compromise of affected computers. Failed exploit attempts will likely result in denial-of-service conditions.
Vendor Status:
Vendor as issued an updated vulnerability.