An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object.
To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.
The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.
To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.
The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-08-04T06:39:10.638Z
Reserved: 2019-11-04T00:00:00
Link: CVE-2020-1578

No data.

Status : Modified
Published: 2020-08-17T19:15:21.240
Modified: 2024-11-21T05:10:53.093
Link: CVE-2020-1578

No data.

No data.