FAQ
What privileges could be gained by an attacker who successfully exploited this vulnerability? If successfully exploited, this vulnerability could case attacker-controlled data on the heap to overwrite critical structures of the service, leading to arbitrary memory write or control flow hijacking, resulting in privilege escalation