[German]In all versions of Windows, there is a vulnerability in the Microsoft Graphics component that could allow an attacker to escalate privileges. Details are now available.
Advertising
The Windows Graphics Vulnerability CVE-2020-0791
Microsoft has already released details of the Windows graphics vulnerability CVE-2020-0791 on March 10, 2020. A vulnerability exists in the Windows graphics component that allows privilege escalation because objects in memory are not processed properly. An attacker who successfully exploited this vulnerability could run processes with elevated privileges.
In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control of the affected system. Microsoft states on its CVE-2020-0791 website that the vulnerability is unlikely to be exploitable. On this page the exploitability score is given as 3.9. Furthermore, the vulnerability was not publicly known at the time. However, Microsoft has released security updates to close this vulnerability in March 2020. The updates and Microsoft's classification can be found at Microsoft's website at CVE-2020-0791.
CheckPoint Research reveals details
For people who deal with vulnerabilities: CheckPoint Research has just released details of the Windows graphics vulnerability CVE-2020-0791. The following tweet refers to this release.
[CPR-Zero] CVE-2020-0791 (Windows 10 Kernel): Out-Of-Bounds Read\Write in the StrechBlt function in win32kfull.syshttps://t.co/PGg9X2bNHE
— Check Point Research (@_CPResearch_) April 20, 2020
The vulnerability is found in the module win32kfull.sys and occurs in the StrechBlt function. This allows an out-of-bounds read/write operation. The security researchers have published a Proof of Concept (PoC) for Windows 10 version 1909, which crashes this Windows with a blue screen.
Advertising
Advertising