Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-16911— GDI+ Remote Code Execution Vulnerability

CVSS 8.8 · High EPSS 17.73% · P95
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-16911

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
GDI+ Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
<p>A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.</p> <p>There are multiple ways an attacker could exploit the vulnerability:</p> <ul> <li>In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to open an email attachment or click a link in an email or instant message.</li> <li>In a file-sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerability, and then convince users to open the document file.</li> </ul> <p>The security update addresses the vulnerability by correcting the way that the Windows GDI handles objects in the memory.</p>
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows 图形设备接口 (GDI) 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows是美国微软(Microsoft)公司的一种桌面操作系统。 Windows 图形设备接口 (GDI)存在代码问题漏洞。该漏洞允许攻击者可能会控制受影响的系统。以下产品及版本受到影响: Windows 10 1909版本, Windows 10 1709版本, Windows Server 1909版本, Windows Server 2004版本, Windows Server 1903版本, Windows 10 2004版本, Windows 10 1809版本, Wi
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftWindows 10 Version 1803 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
MicrosoftWindows 10 Version 1809 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*
MicrosoftWindows Server 2019 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
MicrosoftWindows Server 2019 (Server Core installation) 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1909 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*
MicrosoftWindows Server, version 1909 (Server Core installation) 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1709 for 32-bit Systems 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1709 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1903 for 32-bit Systems 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1903 for x64-based Systems 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1903 for ARM64-based Systems 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*
MicrosoftWindows Server, version 1903 (Server Core installation) 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 2004 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
MicrosoftWindows Server version 2004 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*
MicrosoftWindows 10 Version 1507 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*
MicrosoftWindows 10 Version 1607 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*
MicrosoftWindows Server 2016 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
MicrosoftWindows Server 2016 (Server Core installation) 10.0.0 ~ publication cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
MicrosoftWindows 8.1 6.3.0 ~ publication cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*
MicrosoftWindows Server 2012 6.2.0 ~ publication cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 (Server Core installation) 6.2.0 ~ publication cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 6.3.0 ~ publication cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.0 ~ publication cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*

II. Public POCs for CVE-2020-16911

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-16911

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2020-10-16 · 89 CVEs total

CVE-2020-10808.8 HIGHWindows Hyper-V Elevation of Privilege Vulnerability
CVE-2020-168988.8 HIGHWindows TCP/IP Remote Code Execution Vulnerability
CVE-2020-168918.8 HIGHWindows Hyper-V Remote Code Execution Vulnerability
CVE-2020-169468.7 HIGHMicrosoft Office SharePoint XSS Vulnerability
CVE-2020-169458.7 HIGHMicrosoft Office SharePoint XSS Vulnerability
CVE-2020-169448.7 HIGHMicrosoft SharePoint Reflective XSS Vulnerability
CVE-2020-169528.6 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2020-169518.6 HIGHMicrosoft SharePoint Remote Code Execution Vulnerability
CVE-2020-169317.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169547.8 HIGHMicrosoft Office Remote Code Execution Vulnerability
CVE-2020-169397.8 HIGHGroup Policy Elevation of Privilege Vulnerability
CVE-2020-169367.8 HIGHWindows Backup Service Elevation of Privilege Vulnerability
CVE-2020-169357.8 HIGHWindows COM Server Elevation of Privilege Vulnerability
CVE-2020-169297.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169287.8 HIGHMicrosoft Office Click-to-Run Elevation of Privilege Vulnerability
CVE-2020-169247.8 HIGHJet Database Engine Remote Code Execution Vulnerability
CVE-2020-169237.8 HIGHMicrosoft Graphics Components Remote Code Execution Vulnerability
CVE-2020-169307.8 HIGHMicrosoft Excel Remote Code Execution Vulnerability
CVE-2020-169407.8 HIGHWindows - User Profile Service Elevation of Privilege Vulnerability
CVE-2020-169677.8 HIGHWindows Camera Codec Pack Remote Code Execution Vulnerability

Showing top 20 of 89 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2020-16911

No comments yet


Leave a comment