<p>An information disclosure vulnerability exists when the Windows KernelStream improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system.</p>
<p>To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system.</p>
<p>The update addresses the vulnerability by correcting how the Windows KernelStream handles objects in memory.</p>
References
Link | Resource |
---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16889 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: microsoft
Published: 2020-10-16T22:17:36
Updated: 2023-12-31T19:19:43.788Z
Reserved: 2020-08-04T00:00:00
Link: CVE-2020-16889
JSON object: View
NVD Information
Status : Modified
Published: 2020-10-16T23:15:12.930
Modified: 2023-12-31T20:15:47.423
Link: CVE-2020-16889
JSON object: View
Redhat Information
No data.
CWE