mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
254 lines
12 KiB
JSON
254 lines
12 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2020-0761",
|
|
"ASSIGNER": "secure@microsoft.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "<p>A remote code execution vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account</p>\n<p>To exploit the vulnerability, an authenticated attacker could send malicious requests to an Active Directory integrated DNS (ADIDNS) server.</p>\n<p>The update addresses the vulnerability by correcting how Active Directory integrated DNS (ADIDNS) handles objects in memory.</p>\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Remote Code Execution"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Microsoft",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Windows Server version 2004",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2019",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2019 (Server Core installation)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server, version 1909 (Server Core installation)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server, version 1903 (Server Core installation)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2016",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2016 (Server Core installation)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "10.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2008 Service Pack 2",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "6.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2008 Service Pack 2 (Server Core installation)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "6.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2008 Service Pack 2",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "6.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2008 R2 Service Pack 1",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "6.1.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "6.0.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2012",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "6.2.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2012 (Server Core installation)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "6.2.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2012 R2",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "6.3.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Windows Server 2012 R2 (Server Core installation)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "6.3.0",
|
|
"version_value": "publication"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0761",
|
|
"refsource": "MISC",
|
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0761"
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"baseSeverity": "HIGH",
|
|
"baseScore": 8.8,
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C"
|
|
}
|
|
]
|
|
}
|
|
} |