7.5
CWE
401
Advisory Published
Updated

CVE-2020-16949: Microsoft Outlook Denial of Service Vulnerability

First published: Fri Oct 16 2020(Updated: )

<p>A denial of service vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could cause a remote denial of service against a system.</p> <p>Exploitation of the vulnerability requires that a specially crafted email be sent to a vulnerable Outlook server.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Outlook handles objects in memory.</p>

Credit: secure@microsoft.com secure@microsoft.com

Affected SoftwareAffected VersionHow to fix
Microsoft Windows 10
Microsoft Windows 10=1607
Microsoft Windows 10=1709
Microsoft Windows 10=1803
Microsoft Windows 10=1809
Microsoft Windows 10=1903
Microsoft Windows 10=1909
Microsoft Windows 10=2004
Microsoft Windows 7=sp1
Microsoft Windows 8.1
Microsoft Windows RT 8.1
Microsoft Windows Server 2008=sp2
Microsoft Windows Server 2008=r2-sp1
Microsoft Windows Server 2012
Microsoft Windows Server 2012=r2
Microsoft Windows Server 2016
Microsoft Windows Server 2016=1903
Microsoft Windows Server 2016=1909
Microsoft Windows Server 2016=2004
Microsoft Windows Server 2019
Microsoft 365 Apps
Microsoft Office=2019
Microsoft Outlook=2010-sp2
Microsoft Outlook=2013-sp1
Microsoft Outlook=2013-sp1
Microsoft Outlook=2016

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-16949?

    CVE-2020-16949 is a denial of service vulnerability in Microsoft Outlook software.

  • How does CVE-2020-16949 affect Microsoft Outlook?

    CVE-2020-16949 causes Microsoft Outlook to fail when handling objects in memory.

  • Which software versions are affected by CVE-2020-16949?

    CVE-2020-16949 affects Microsoft Windows 7, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2012, Windows Server 2016, Windows Server 2019, Microsoft Office 2019, Microsoft Office LTSC for Mac 2021, and specific versions of Microsoft Outlook (2010, 2013, 2016).

  • What is the severity of CVE-2020-16949?

    CVE-2020-16949 has a severity rating of 7.5 (high).

  • How can I fix CVE-2020-16949?

    To fix CVE-2020-16949, apply the security update provided by Microsoft, as mentioned in the reference link.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203