| ID |
CVE-2020-1578
|
| Sažetak |
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object.
To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application.
The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses. |
| Reference |
|
| CVSS |
| Base: | 1.9 |
| Impact: | 2.9 |
| Exploitability: | 3.4 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| LOCAL |
MEDIUM |
NONE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| PARTIAL |
NONE |
NONE |
|
| CVSS vektor |
AV:L/AC:M/Au:N/C:P/I:N/A:N |
| Zadnje važnije ažuriranje |
23-02-2026 - 18:25 |
| Objavljeno |
17-08-2020 - 19:15 |