cvelist/2020/1xxx/CVE-2020-1574.json

84 lines
3.0 KiB
JSON
Raw Normal View History

2020-08-17 11:56:03 -07:00
{
2024-01-04 02:01:19 +00:00
"data_version": "4.0",
2020-08-17 20:02:38 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2020-1574",
2024-01-04 02:01:19 +00:00
"ASSIGNER": "secure@microsoft.com",
2020-08-17 20:02:38 +00:00
"STATE": "PUBLIC"
},
2024-01-04 02:01:19 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2024-01-19 00:00:34 +00:00
"value": "A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code.\nExploitation of the vulnerability requires that a program process a specially crafted image file.\nThe update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory.\n"
2024-01-04 02:01:19 +00:00
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
2020-08-17 20:02:38 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
2024-01-04 02:01:19 +00:00
"vendor_name": "Microsoft",
2020-08-17 20:02:38 +00:00
"product": {
"product_data": [
{
2024-01-04 02:01:19 +00:00
"product_name": "Windows 10 Version 2004",
2020-08-17 20:02:38 +00:00
"version": {
"version_data": [
{
2024-01-04 02:01:19 +00:00
"version_affected": "=",
"version_value": "N/A"
2020-08-17 20:02:38 +00:00
}
]
}
},
{
2024-01-04 02:01:19 +00:00
"product_name": "Windows 10 Version 1909",
2020-08-17 20:02:38 +00:00
"version": {
"version_data": [
{
2024-01-04 02:01:19 +00:00
"version_affected": "=",
"version_value": "N/A"
2020-08-17 20:02:38 +00:00
}
]
}
}
]
2024-01-04 02:01:19 +00:00
}
2020-08-17 11:56:03 -07:00
}
]
}
2020-08-17 20:02:38 +00:00
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1574",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1574"
}
]
2024-01-04 02:01:19 +00:00
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "MEDIUM",
"baseScore": 5.5,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C"
}
]
2020-08-17 20:02:38 +00:00
}
}