CVE-2020-0794: Windows Denial of Service Vulnerability
Overview
- Severity
- High (CVSS 7.1)
- CVSS Vector
- CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C
- Category
- Denial of Service
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2020-Apr
- Released
- 2020-04-14
- Last Updated
- 2020-08-11
- EPSS Score
- 0.23% (percentile: 46.1%)
Description
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding.
To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding.
The update addresses the vulnerability by correcting how Windows handles objects in memory.
Affected Products (26)
Windows
- Windows 10 Version 1803 for 32-bit Systems
- Windows 10 Version 1803 for x64-based Systems
- Windows Server, version 1803 (Server Core Installation)
- Windows 10 Version 1803 for ARM64-based Systems
- Windows 10 Version 1809 for 32-bit Systems
- Windows 10 Version 1809 for x64-based Systems
- Windows 10 Version 1809 for ARM64-based Systems
- Windows Server 2019
- Windows Server 2019 (Server Core installation)
- Windows 10 Version 1709 for 32-bit Systems
- Windows 10 Version 1709 for x64-based Systems
- Windows 10 Version 1709 for ARM64-based Systems
- Windows 10 Version 1903 for 32-bit Systems
- Windows 10 Version 1903 for x64-based Systems
- Windows 10 Version 1903 for ARM64-based Systems
- Windows Server, version 1903 (Server Core installation)
- Windows 10 for 32-bit Systems
- Windows 10 for x64-based Systems
- Windows 10 Version 1607 for 32-bit Systems
- Windows 10 Version 1607 for x64-based Systems
- Windows Server 2016
- Windows Server 2016 (Server Core installation)
- Windows 10 Version 1909 for 32-bit Systems
- Windows 10 Version 1909 for x64-based Systems
- Windows 10 Version 1909 for ARM64-based Systems
- Windows Server, version 1909 (Server Core installation)
Security Updates (6)
Acknowledgments
Jeong Oh Kyea(@kkokkokye) of THEORI working with <a href="https://www.zerodayinitiative.com/">Trend Micro's Zero Day Initiative</a>, <a href="nmarkus@paloaltonetworks.com">Nadav Markus</a> and <a href="ysamuel@paloaltonetworks.com">Yaron Samuel</a> of Palo Alto Networks, Zhiniang Peng (@edwardzpeng) of Qihoo 360 Core security and Fangming Gu (@afang5472), Jarvis_1oop of Pinduoduo Security Research Lab, k0shl of Qihoo 360 Vulcan team
Revision History
- 2020-04-14: Information published.
- 2020-08-11: In the Security Updates table, added all supported versions of Windows 10 for 32-bit Systems, Windows 10 for x64-based Systems, Windows 10 Version 1607, and Windows Server 2016 because these versions of Windows 10 and Windows Server are also affected by this vulnerability. Microsoft strongly recommends that customers running any of these versions of Windows 10 or Windows Server install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.