A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.
There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage.
The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.

Project Subscriptions

Vendors Products
Microsoft Subscribe
Windows 10 Subscribe
Windows 10 1507 Subscribe
Windows 10 1607 Subscribe
Windows 10 1803 Subscribe
Windows 10 1809 Subscribe
Windows 10 1909 Subscribe
Windows Server 1903 Subscribe
Windows Server 1909 Subscribe
Windows Server 2004 Subscribe
Windows Server 2016 Subscribe
Windows Server 2019 Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-12399 A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2024-08-04T06:39:10.466Z

Reserved: 2019-11-04T00:00:00

Link: CVE-2020-1525

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-17T19:15:17.960

Modified: 2024-11-21T05:10:45.330

Link: CVE-2020-1525

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses