Lucene search

K
cve[email protected]CVE-2020-0664
HistorySep 11, 2020 - 5:15 p.m.

CVE-2020-0664

2020-09-1117:15:00
NVD-CWE-noinfo
web.nvd.nist.gov
60
cve-2020-0664
active directory
dns
information disclosure
vulnerability
memory mishandling

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

7 High

AI Score

Confidence

High

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.013 Low

EPSS

Percentile

85.6%

<p>An information disclosure vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited this vulnerability would be able to read sensitive information about the target system.</p>
<p>To exploit this condition, an authenticated attacker would need to send a specially crafted request to the AD|DNS service. Note that the information disclosure vulnerability by itself would not be sufficient for an attacker to compromise a system. However, an attacker could combine this vulnerability with additional vulnerabilities to further exploit the system.</p>
<p>The update addresses the vulnerability by correcting how Active Directory integrated DNS (ADIDNS) handles objects in memory.</p>

VendorProductVersionCPE
microsoftwindows_server_version_200410.0.0cpe:2.3:o:microsoft:windows_server_version_2004:10.0.0:*:*:*:*:*:*:*
microsoftwindows_server_201910.0.0cpe:2.3:o:microsoft:windows_server_2019:10.0.0:*:*:*:*:*:*:*
microsoftwindows_server_201910.0.0cpe:2.3:o:microsoft:windows_server_2019:10.0.0:*:*:*:*:*:*:*
microsoftwindows_server,_version_190910.0.0cpe:2.3:o:microsoft:windows_server,_version_1909:10.0.0:*:*:*:*:*:*:*
microsoftwindows_server,_version_190310.0.0cpe:2.3:o:microsoft:windows_server,_version_1903:10.0.0:*:*:*:*:*:*:*
microsoftwindows_server_201610.0.0cpe:2.3:o:microsoft:windows_server_2016:10.0.0:*:*:*:*:*:*:*
microsoftwindows_server_201610.0.0cpe:2.3:o:microsoft:windows_server_2016:10.0.0:*:*:*:*:*:*:*
microsoftwindows_server_2008_sp26.0.0cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.0:sp2:*:*:*:*:*:*
microsoftwindows_server_2008_sp26.0.0cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.0:sp2:*:*:*:*:*:*
microsoftwindows_server_2008_sp26.0.0cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.0:sp2:*:*:*:*:*:*
Rows per page:
1-10 of 161

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

7 High

AI Score

Confidence

High

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.013 Low

EPSS

Percentile

85.6%