Windows graphics vulnerability details CVE-2020-0791

[German]In all versions of Windows, there is a vulnerability in the Microsoft Graphics component that could allow an attacker to escalate privileges. Details are now available.


Advertising

The Windows Graphics Vulnerability CVE-2020-0791

Microsoft has already released details of the Windows graphics vulnerability CVE-2020-0791 on March 10, 2020. A vulnerability exists in the Windows graphics component that allows privilege escalation because objects in memory are not processed properly. An attacker who successfully exploited this vulnerability could run processes with elevated privileges.

In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control of the affected system. Microsoft states on its CVE-2020-0791 website that the vulnerability is unlikely to be exploitable. On this page the exploitability score is given as 3.9. Furthermore, the vulnerability was not publicly known at the time. However, Microsoft has released security updates to close this vulnerability in March 2020. The updates and Microsoft's classification can be found at Microsoft's website at CVE-2020-0791

CheckPoint Research reveals details

For people who deal with vulnerabilities: CheckPoint Research has just released details of the Windows graphics vulnerability CVE-2020-0791. The following tweet refers to this release.

The vulnerability is found in the module win32kfull.sys and occurs in the StrechBlt function. This allows an out-of-bounds read/write operation. The security researchers have published a Proof of Concept (PoC) for Windows 10 version 1909, which crashes this Windows with a blue screen.


Advertising


Advertising

This entry was posted in Security, Update, Windows and tagged , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: Please note the rules for commenting on the blog (first comments and linked posts end up in moderation, I release them every few hours, I rigorously delete SEO posts/SPAM).