CVE-2020-1232 – Microsoft Windows Media Player DTS Stream Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2020-1232
An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory, aka 'Media Foundation Information Disclosure Vulnerability'. Se presenta una vulnerabilidad de divulgación de información cuando Media Foundation maneja inapropiadamente objetos en memoria, también se conoce como "Media Foundation Information Disclosure Vulnerability" This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Windows Media Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DTS streams. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1232 https://www.zerodayinitiative.com/advisories/ZDI-20-693 • CWE-125: Out-of-bounds Read •
CVE-2020-1238 – Microsoft Windows Media Foundation Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-1238
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1239. Se presenta una vulnerabilidad de corrupción de la memoria cuando Windows Media Foundation maneja inapropiadamente objetos en memoria, también se conoce como "Media Foundation Memory Corruption Vulnerability". Este ID de CVE es diferente de CVE-2020-1239 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the Media Foundation libraries. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1238 https://www.zerodayinitiative.com/advisories/ZDI-20-695 https://www.zerodayinitiative.com/advisories/ZDI-20-696 • CWE-787: Out-of-bounds Write •
CVE-2020-1239 – Microsoft Windows Media Player mpg2splt Integer Underflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-1239
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka 'Media Foundation Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1238. Se presenta una vulnerabilidad de corrupción de la memoria cuando Windows Media Foundation maneja inapropiadamente objetos en memoria, también se conoce como "Media Foundation Memory Corruption Vulnerability". Este ID de CVE es diferente de CVE-2020-1238 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows Media Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the mpg2splt.ax module. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1239 https://www.zerodayinitiative.com/advisories/ZDI-20-697 • CWE-20: Improper Input Validation CWE-191: Integer Underflow (Wrap or Wraparound) CWE-787: Out-of-bounds Write •
CVE-2020-1219 – Microsoft Chakra Intl Object Type Confusion Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-1219
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vulnerability'. Se presenta una vulnerabilidad de ejecución de código remota en la manera en que los navegadores de Microsoft acceden a objetos en memoria, también se conoce como "Microsoft Browser Memory Corruption Vulnerability" This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Chakra. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Intl object in JavaScript. By performing actions in JavaScript, an attacker can trigger a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1219 https://www.zerodayinitiative.com/advisories/ZDI-20-698 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2020-1207 – Microsoft Windows win32kfull PDEVOBJ Use-After-Free Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2020-1207
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1247, CVE-2020-1251, CVE-2020-1253, CVE-2020-1310. Se presenta una vulnerabilidad de elevación de privilegios en Windows cuando el controlador del modo kernel de Windows presenta un fallo al manejar apropiadamente objetos en memoria, también se conoce como "Win32k Elevation of Privilege Vulnerability". Este ID de CVE es diferente de CVE-2020-1247, CVE-2020-1251, CVE-2020-1253, CVE-2020-1310 This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of palette objects. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1207 https://www.zerodayinitiative.com/advisories/ZDI-20-692 • CWE-416: Use After Free •