An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system.
A locally authenticated attacker could exploit this vulnerability by running a specially crafted application.
The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-12253 An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2024-08-04T06:32:01.249Z

Reserved: 2019-11-04T00:00:00

Link: CVE-2020-1377

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-17T19:15:14.350

Modified: 2024-11-21T05:10:21.997

Link: CVE-2020-1377

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.