<p>A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.</p>
<p>To exploit the vulnerability, a user would have to open a specially crafted file or lure the target to a website hosting malicious JavaScript.</p>
<p>The security update addresses the vulnerability by correcting how Microsoft COM for Windows handles objects in memory.</p>
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0922 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: microsoft
Published: 2020-09-11T17:08:31
Updated: 2023-12-31T21:34:29.200Z
Reserved: 2019-11-04T00:00:00
Link: CVE-2020-0922
JSON object: View
NVD Information
Status : Modified
Published: 2020-09-11T17:15:14.887
Modified: 2023-12-31T22:15:48.027
Link: CVE-2020-0922
JSON object: View
Redhat Information
No data.
CWE