Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2020-04154

Опубликовано: 11 авг. 2020
Источник: fstec
CVSS3: 5.5
CVSS2: 4.6
EPSS Средний

Описание

Уязвимость компонента Media Foundation операционных систем Windows связана с чтением за границами буфера в памяти. Эксплуатация уязвимости может позволить нарушителю раскрыть защищаемую информацию с помощью специально созданного файла

Вендор

Microsoft Corp

Наименование ПО

Windows 7 Service Pack 1
Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Windows 10
Windows 10 1607
Windows Server 2016
Windows RT 8.1
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016 (Server Core installation)
Windows 10 1709
Windows 10 1803
Windows 10 1809
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows 10 1903
Windows Server 1903 (Server Core Installation)
Windows 10 1909
Windows Server 1909 (Server Core Installation)
Windows 10 2004
Windows Server 2004 (Server Core Installation)
Windows Server 2012 (Server Core installation)

Версия ПО

- (Windows 7 Service Pack 1)
- (Windows 7 Service Pack 1)
- (Windows 8.1)
- (Windows 8.1)
- (Windows Server 2012)
- (Windows Server 2012 R2)
- (Windows 10)
- (Windows 10)
- (Windows 10 1607)
- (Windows 10 1607)
- (Windows Server 2016)
- (Windows RT 8.1)
- (Windows Server 2012 R2 (Server Core installation))
- (Windows Server 2016 (Server Core installation))
- (Windows 10 1709)
- (Windows 10 1709)
- (Windows 10 1803)
- (Windows 10 1803)
- (Windows 10 1809)
- (Windows 10 1809)
- (Windows Server 2019)
- (Windows Server 2019 (Server Core installation))
- (Windows 10 1809)
- (Windows 10 1709)
- (Windows 10 1803)
- (Windows 10 1903)
- (Windows 10 1903)
- (Windows 10 1903)
- (Windows Server 1903 (Server Core Installation))
- (Windows 10 1909)
- (Windows 10 1909)
- (Windows 10 1909)
- (Windows Server 1909 (Server Core Installation))
- (Windows 10 2004)
- (Windows 10 2004)
- (Windows 10 2004)
- (Windows Server 2004 (Server Core Installation))
- (Windows Server 2012 (Server Core installation))

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Microsoft Corp Windows 7 Service Pack 1 -
Microsoft Corp Windows 7 Service Pack 1 -
Microsoft Corp Windows 8.1 -
Microsoft Corp Windows 8.1 -
Microsoft Corp Windows Server 2012 -
Microsoft Corp Windows Server 2012 R2 -
Microsoft Corp Windows 10 -
Microsoft Corp Windows 10 -
Microsoft Corp Windows 10 1607 -
Microsoft Corp Windows 10 1607 -
Microsoft Corp Windows Server 2016 -
Microsoft Corp Windows RT 8.1 -
Microsoft Corp Windows Server 2012 R2 (Server Core installation) -
Microsoft Corp Windows Server 2016 (Server Core installation) -
Microsoft Corp Windows 10 1709 -
Microsoft Corp Windows 10 1709 -
Microsoft Corp Windows 10 1803 -
Microsoft Corp Windows 10 1803 -
Microsoft Corp Windows 10 1809 -
Microsoft Corp Windows 10 1809 -
Microsoft Corp Windows Server 2019 -
Microsoft Corp Windows Server 2019 (Server Core installation) -
Microsoft Corp Windows 10 1809 -
Microsoft Corp Windows 10 1709 -
Microsoft Corp Windows 10 1803 -
Microsoft Corp Windows 10 1903 -
Microsoft Corp Windows 10 1903 -
Microsoft Corp Windows 10 1903 -
Microsoft Corp Windows Server 1903 (Server Core Installation) -
Microsoft Corp Windows 10 1909 -
Microsoft Corp Windows 10 1909 -
Microsoft Corp Windows 10 1909 -
Microsoft Corp Windows Server 1909 (Server Core Installation) -
Microsoft Corp Windows 10 2004 -
Microsoft Corp Windows 10 2004 -
Microsoft Corp Windows 10 2004 -
Microsoft Corp Windows Server 2004 (Server Core Installation) -
Microsoft Corp Windows Server 2012 (Server Core installation) -

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,6)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,5)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1487

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 95%
0.19214
Средний

5.5 Medium

CVSS3

4.6 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.8
nvd
около 5 лет назад

An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log onto an affected system and open a specially crafted file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. The update addresses the vulnerability by correcting how Media Foundation handles objects in memory.

CVSS3: 5.5
msrc
около 5 лет назад

Media Foundation Information Disclosure Vulnerability

CVSS3: 7.8
github
больше 3 лет назад

An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory, aka 'Media Foundation Information Disclosure Vulnerability'.

EPSS

Процентиль: 95%
0.19214
Средний

5.5 Medium

CVSS3

4.6 Medium

CVSS2