|
|||
Rule General Information |
---|
Release Date: | 2020-06-30 | |
Rule Name: | Microsoft Windows CAB File Parsing Directory Traversal Vulnerability (CVE-2020-1300) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files.To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network printer and trick a user into installing a malicious cabinet file disguised as a printer driver.The update addresses the vulnerability by correcting how Windows handles cabinet files., aka 'Windows Remote Code Execution Vulnerability'. | |
Impact: | An attacker can abtain sensitive information of the target victim, and do malicious actions to gain profits using the information. | |
Affected OS: | Windows | |
Reference: | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1300 https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1300 https://vigilance.fr/vulnerability/Windows-vulnerabilities-of-June-2020-32500 http://www.nsfocus.net/vulndb/46918 https://nvd.nist.gov/vuln/detail/CVE-2020-1300 |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2020-1300 |