{"id":14161,"date":"2020-04-21T00:13:00","date_gmt":"2020-04-20T22:13:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=14161"},"modified":"2020-04-21T00:05:38","modified_gmt":"2020-04-20T22:05:38","slug":"details-zum-windows-grafik-schwachstelle-cve-2020-0791","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/04\/21\/details-zum-windows-grafik-schwachstelle-cve-2020-0791\/","title":{"rendered":"Windows graphics vulnerability details CVE-2020-0791"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/win102.jpg\" width=\"58\" align=\"left\" height=\"58\">[<a href=\"https:\/\/www.borncity.com\/blog\/?p=230911\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]In all versions of Windows, there is a vulnerability in the Microsoft Graphics component that could allow an attacker to escalate privileges. Details are now available. <\/p>\n<p><!--more--><\/p>\n<h2>The Windows Graphics Vulnerability CVE-2020-0791<\/h2>\n<p>Microsoft has already released details of the Windows graphics vulnerability <a href=\"https:\/\/portal.msrc.microsoft.com\/de-DE\/security-guidance\/advisory\/CVE-2020-0791\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-0791<\/a> on March 10, 2020. A vulnerability exists in the Windows graphics component that allows privilege escalation because objects in memory are not processed properly. An attacker who successfully exploited this vulnerability could run processes with elevated privileges.<\/p>\n<p>In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control of the affected system. Microsoft states on its <a href=\"https:\/\/portal.msrc.microsoft.com\/de-DE\/security-guidance\/advisory\/CVE-2020-0791\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-0791<\/a> website that the vulnerability is unlikely to be exploitable. On <a href=\"https:\/\/vulmon.com\/vulnerabilitydetails?qid=CVE-2020-0791\" target=\"_blank\" rel=\"noopener noreferrer\">this page<\/a> the exploitability score is given as 3.9. Furthermore, the vulnerability was not publicly known at the time. However, Microsoft has released security updates to close this vulnerability in March 2020. The updates and Microsoft's classification can be found at Microsoft's website at <a href=\"https:\/\/portal.msrc.microsoft.com\/de-DE\/security-guidance\/advisory\/CVE-2020-0791\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-0791<\/a>.&nbsp; <\/p>\n<h2>CheckPoint Research reveals details<\/h2>\n<p>For people who deal with vulnerabilities: CheckPoint Research has just released details of the Windows graphics vulnerability <a href=\"https:\/\/portal.msrc.microsoft.com\/de-DE\/security-guidance\/advisory\/CVE-2020-0791\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-0791<\/a>. The following tweet refers to this release.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">[CPR-Zero] CVE-2020-0791 (Windows 10 Kernel): Out-Of-Bounds Read\\Write in the StrechBlt function in win32kfull.sys<a href=\"https:\/\/t.co\/PGg9X2bNHE\">https:\/\/t.co\/PGg9X2bNHE<\/a><\/p>\n<p>\u2014 Check Point Research (@_CPResearch_) <a href=\"https:\/\/twitter.com\/_CPResearch_\/status\/1252174102133116928?ref_src=twsrc%5Etfw\">April 20, 2020<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/p>\n<p>The vulnerability is found in the module <em>win32kfull.sys<\/em> and occurs in the <em>StrechBlt<\/em> function. This allows an out-of-bounds read\/write operation. The security researchers have published a Proof of Concept (PoC) for Windows 10 version 1909, which crashes this Windows with a blue screen.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]In all versions of Windows, there is a vulnerability in the Microsoft Graphics component that could allow an attacker to escalate privileges. Details are now available.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22,2],"tags":[69,195,76],"class_list":["post-14161","post","type-post","status-publish","format-standard","hentry","category-security","category-update","category-windows","tag-security","tag-update","tag-windows-10"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/14161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=14161"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/14161\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=14161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=14161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=14161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}