First published: Fri Sep 11 2020(Updated: )
<p>An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system.</p> <p>There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document or by convincing a user to visit an untrusted webpage.</p> <p>The update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =1607 | |
Windows 10 | =1709 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Windows 10 | =1903 | |
Windows 10 | =1909 | |
Windows 10 | =2004 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1091 is rated as important, indicating that it requires attention but is not considered critical.
You can fix CVE-2020-1091 by applying the security updates provided by Microsoft for affected Windows versions.
CVE-2020-1091 affects multiple versions including Windows 7, Windows 8.1, Windows 10, and several versions of Windows Server.
CVE-2020-1091 can enable an attacker to obtain sensitive information from the machine, which could be used for further system compromise.
It is recommended to install the latest security updates as the primary way to mitigate CVE-2020-1091, as there are no effective workarounds.