Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2020-1219: Microsoft Browser Memory Corruption Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2020-1219: Microsoft Browser Memory Corruption Vulnerability

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
06/09/2020
Created
06/10/2020
Added
06/09/2020
Modified
09/06/2024

Description

A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vulnerability'.

Solution(s)

  • microsoft-windows-windows_10-1507-kb4561649
  • microsoft-windows-windows_10-1607-kb4561616
  • microsoft-windows-windows_10-1709-kb4561602
  • microsoft-windows-windows_10-1803-kb4561621
  • microsoft-windows-windows_10-1809-kb4561608
  • microsoft-windows-windows_10-1903-kb4560960
  • microsoft-windows-windows_10-1909-kb4560960
  • microsoft-windows-windows_10-2004-kb4557957
  • microsoft-windows-windows_server_2012-kb4561603
  • microsoft-windows-windows_server_2012_r2-kb4561603
  • microsoft-windows-windows_server_2016-1607-kb4561616
  • microsoft-windows-windows_server_2019-1809-kb4561608
  • msft-kb4557957-abd03b60-058d-4d8e-92d8-350e56c295ad
  • msft-kb4560960-35eeaed4-c0c0-436f-a584-b58f31a89642
  • msft-kb4560960-ad75f2bc-0622-4a84-a93d-bb94fe8cff13
  • msft-kb4561603-06ea6425-7645-4f7d-acba-8f121957a436
  • msft-kb4561603-3a66f08a-4c5b-4daa-8a88-6a512d2148dd
  • msft-kb4561603-3e3fdc76-7b3b-4e11-8d21-fb903adb9b89
  • msft-kb4561603-509ae8da-6e32-459e-96a9-d41c7e3172f6
  • msft-kb4561603-6286bc75-b3c1-48c7-aa8f-e00bafd56ba5
  • msft-kb4561603-6d5630e8-2ba1-432d-9bd9-43846e90552d
  • msft-kb4561603-8c2626c5-8b34-4217-af2b-3f9655221f78
  • msft-kb4561603-8d87c570-9484-4fd9-8216-656dee501420
  • msft-kb4561603-c52ceacd-f3e5-4460-8996-dc79bc6a8cc8
  • msft-kb4561603-d1af561e-0504-4a39-a5c5-bdac4cbf1f62
  • msft-kb4561603-f3af84d6-599a-437a-8f94-ef001a562cce

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;