SB2020051224 - Multiple vulnerabilities in Microsoft Windows State Repository Service



SB2020051224 - Multiple vulnerabilities in Microsoft Windows State Repository Service

Published: May 12, 2020

Security Bulletin ID SB2020051224
Severity
Low
Patch available
YES
Number of vulnerabilities 12
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 12 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2020-1191)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when the Windows State Repository Service improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Buffer overflow (CVE-ID: CVE-2020-1188)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when the Windows State Repository Service improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Buffer overflow (CVE-ID: CVE-2020-1187)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when the Windows State Repository Service improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Buffer overflow (CVE-ID: CVE-2020-1185)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when the Windows State Repository Service improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Buffer overflow (CVE-ID: CVE-2020-1184)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when the Windows State Repository Service improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


6) Buffer overflow (CVE-ID: CVE-2020-1131)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when the Windows State Repository Service improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Buffer overflow (CVE-ID: CVE-2020-1190)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when the Windows State Repository Service improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


8) Buffer overflow (CVE-ID: CVE-2020-1189)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when the Windows State Repository Service improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


9) Buffer overflow (CVE-ID: CVE-2020-1186)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when the Windows State Repository Service improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


10) Buffer overflow (CVE-ID: CVE-2020-1144)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when the Windows State Repository Service improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


11) Buffer overflow (CVE-ID: CVE-2020-1134)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when the Windows State Repository Service improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


12) Buffer overflow (CVE-ID: CVE-2020-1124)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error when the Windows State Repository Service improperly handles objects in memory. A local user can use a specially crafted application to trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.