An elevation of privilege vulnerability exists when the Windows Ancillary Function Driver for WinSock improperly handles memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how the Windows Ancillary Function Driver for WinSock handles memory.
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1587 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: microsoft
Published: 2020-08-17T19:13:52
Updated: 2024-05-29T16:33:23.155Z
Reserved: 2019-11-04T00:00:00
Link: CVE-2020-1587
JSON object: View
NVD Information
Status : Modified
Published: 2020-08-17T19:15:21.803
Modified: 2024-01-19T00:15:20.300
Link: CVE-2020-1587
JSON object: View
Redhat Information
No data.
CWE