<p>An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a <a href="https://technet.microsoft.com/en-us/library/security/dn848375.aspx#ASLR">Kernel Address Space Layout Randomization (ASLR)</a> bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object.</p>
<p>To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.</p>
<p>The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.</p>
References
| Link | Resource |
|---|---|
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1578 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-08-17 19:15
Updated : 2024-01-04 02:15
NVD link : CVE-2020-1578
Mitre link : CVE-2020-1578
JSON object : View
Products Affected
microsoft
- windows_server_2019
- windows_10
- windows_server_2016
CWE
