An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object.
To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.
The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2024-08-04T06:39:10.638Z

Reserved: 2019-11-04T00:00:00

Link: CVE-2020-1578

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-17T19:15:21.240

Modified: 2024-11-21T05:10:53.093

Link: CVE-2020-1578

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.