FAQ
How could an attacker exploit this vulnerability? This vulnerability could be exploited over the network by an authenticated attacker through a low complexity attack on a server configured as the domain controller.
No description was published by MSRC.