<p>A remote code execution vulnerability exists when Windows improperly handles objects in memory. To exploit the vulnerability an attacker would have to convince a user to run a specially crafted application.</p> <p>An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>The updates address the vulnerability by correcting how Windows handles objects in memory.</p>
History

Mon, 18 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published: 2020-09-11T17:09:11

Updated: 2024-11-18T16:24:31.210Z

Reserved: 2019-11-04T00:00:00

Link: CVE-2020-1252

cve-icon Vulnrichment

Updated: 2024-08-04T06:31:59.697Z

cve-icon NVD

Status : Modified

Published: 2020-09-11T17:15:20.043

Modified: 2023-12-31T22:16:01.147

Link: CVE-2020-1252

cve-icon Redhat

No data.