{"containers":{"cna":{"title":"Microsoft SQL Server Management Studio Denial of Service Vulnerability","datePublic":"2020-08-11T07:00:00.000Z","affected":[{"vendor":"Microsoft","product":"SQL Server Management Studio 18.6","cpes":["cpe:2.3:a:microsoft:sql_server_management_studio:*:*:*:*:*:*:*:*"],"platforms":["Unknown"],"versions":[{"version":"18.0","lessThan":"publication","versionType":"custom","status":"affected"}]}],"descriptions":[{"value":"A denial of service vulnerability exists when Microsoft SQL Server Management Studio (SSMS) improperly handles files. An attacker could exploit the vulnerability to trigger a denial of service.\nTo exploit the vulnerability, an attacker would first require execution on the victim system.\nThe security update addresses the vulnerability by ensuring Microsoft SQL Server Management Studio properly handles files.","lang":"en-US"}],"problemTypes":[{"descriptions":[{"description":"Denial of Service","lang":"en-US","type":"Impact"}]}],"providerMetadata":{"orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft","dateUpdated":"2024-05-29T16:32:47.690Z"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1455"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseSeverity":"MEDIUM","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:H/RL:O/RC:C"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T06:39:09.660Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1455"}]}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2020-1455","datePublished":"2020-08-17T19:13:02.000Z","dateReserved":"2019-11-04T00:00:00.000Z","dateUpdated":"2024-08-04T06:39:09.660Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}