
16/10/2020

16/1/2024

4/8/2024
CVE-2020-16915: Microsoft Windows Media Player HEVC Stream Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
First published: Fri Oct 16 2020(Updated: )
<p>A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.</p>
<p>There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage.</p>
<p>The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.</p>
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1903 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows 10 | =2004 | |
Microsoft Windows Server 2016 | | |
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2016 | =2004 | |
Microsoft Windows Server 2019 | | |
| | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2020-16915?
CVE-2020-16915 is classified as a critical memory corruption vulnerability in Windows Media Foundation.
How do I fix CVE-2020-16915?
To fix CVE-2020-16915, you should apply the latest security updates provided by Microsoft for the affected Windows versions.
What software is affected by CVE-2020-16915?
CVE-2020-16915 affects several versions of Microsoft Windows 10 and Windows Server, including version 1607 through 2004.
What could an attacker achieve by exploiting CVE-2020-16915?
An attacker exploiting CVE-2020-16915 could install programs, view, change, or delete data, or create new accounts with full user rights.
Is CVE-2020-16915 publicly known?
Yes, CVE-2020-16915 is a publicly disclosed vulnerability that has detailed advisory information available.
- agent/type
- agent/first-publish-date
- agent/author
- agent/weakness
- agent/severity
- agent/references
- agent/title
- agent/remedy
- agent/description
- agent/softwarecombine
- collector/zdi-advisory
- source/ZDI
- alias/ZDI-20-1257
- alias/ZDI-CAN-11980
- alias/CVE-2020-16915
- agent/software-canonical-lookup
- agent/event
- collector/nvd-api
- source/NVD
- agent/software-canonical-lookup-request
- collector/nvd-index
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/trending
- agent/tags
- agent/source
- vendor/microsoft
- canonical/microsoft windows media player
- canonical/microsoft windows 10
- version/microsoft windows 10/1607
- version/microsoft windows 10/1709
- version/microsoft windows 10/1803
- version/microsoft windows 10/1809
- version/microsoft windows 10/1903
- version/microsoft windows 10/1909
- version/microsoft windows 10/2004
- canonical/microsoft windows server 2016
- version/microsoft windows server 2016/1903
- version/microsoft windows server 2016/1909
- version/microsoft windows server 2016/2004
- canonical/microsoft windows server 2019
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203