<p>A remote code execution vulnerability exists when Windows improperly handles objects in memory. To exploit the vulnerability an attacker would have to convince a user to run a specially crafted application.</p>
<p>An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>The updates address the vulnerability by correcting how Windows handles objects in memory.</p>
Metrics
Affected Vendors & Products
References
History
Mon, 18 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-11-18T16:24:31.210Z
Reserved: 2019-11-04T00:00:00
Link: CVE-2020-1252

Updated: 2024-08-04T06:31:59.697Z

Status : Modified
Published: 2020-09-11T17:15:20.043
Modified: 2024-11-21T05:10:05.270
Link: CVE-2020-1252

No data.