First published: Fri Oct 16 2020(Updated: )
<p>A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.</p> <p>To exploit the vulnerability, a user would have to open a specially crafted file.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.</p>
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
=1607 | ||
=1709 | ||
=1803 | ||
=1809 | ||
=1903 | ||
=1909 | ||
=2004 | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1903 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft 3D Builder |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1167 is a vulnerability in Microsoft 3D Builder that allows remote code execution.
Microsoft 3D Builder and various versions of Microsoft Windows 10 and Windows Server 2016/2019 are affected by CVE-2020-1167.
The severity of CVE-2020-1167 is critical with a CVSS score of 7.8.
CVE-2020-1167 can be exploited through user interaction by visiting a malicious page or opening a malicious file.
Yes, you can find references for CVE-2020-1167 at the following links: [link1](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1167), [link2](https://www.zerodayinitiative.com/advisories/ZDI-20-1247/), [link3](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1167).