VulnerabilityDescription
How could an attacker exploit this vulnerability? An authenticated attacker could send a specially crafted request to a vulnerable LDAP server. Successful exploitation could result in the attacker's code running in the context of the SYSTEM account.