CVE-2020-0786: Windows Tile Object Service Denial of Service Vulnerability

Overview

Severity
High (CVSS 7.1)
CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C
Category
Denial of Service
Exploit Status
Not Exploited
Exploitation Likelihood
Less Likely
Patch Tuesday
2020-Mar
Released
2020-03-10
EPSS Score
0.41% (percentile: 61.1%)

Description

A denial of service vulnerability exists when the Windows Tile Object Service improperly handles hard links. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would allow an attacker to overwrite system files. The update addresses the vulnerability by correcting how the Windows Tile Object Service handles hard links.

Affected Products (6)

Windows

  • Windows 10 for 32-bit Systems
  • Windows 10 for x64-based Systems
  • Windows 10 Version 1607 for 32-bit Systems
  • Windows 10 Version 1607 for x64-based Systems
  • Windows Server 2016
  • Windows Server 2016 (Server Core installation)

Security Updates (2)

Acknowledgments

Wenxu Wu <a href="https://twitter.com/ma7h1as">(@ma7h1as)</a> of <a href="http://xlab.tencent.com">Tencent Security Xuanwu Lab</a>, Zhiniang Peng (<a href="https://twitter.com/edwardzpeng">@edwardzpeng</a>) of Qihoo 360 Core security and Xuefeng Li

Revision History

  • 2020-03-10: Information published.