{"containers":{"cna":{"title":"MSHTML Engine Remote Code Execution Vulnerability","datePublic":"2020-08-11T07:00:00.000Z","affected":[{"vendor":"Microsoft","product":"Internet Explorer 11","cpes":["cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"],"platforms":["Windows 10 Version 2004 for 32-bit Systems","Windows 10 Version 2004 for ARM64-based Systems","Windows 10 Version 2004 for x64-based Systems","Windows 10 Version 1803 for 32-bit Systems","Windows 10 Version 1803 for x64-based Systems","Windows 10 Version 1803 for ARM64-based Systems","Windows 10 Version 1809 for 32-bit Systems","Windows 10 Version 1809 for x64-based Systems","Windows 10 Version 1809 for ARM64-based Systems","Windows Server 2019","Windows 10 Version 1909 for 32-bit Systems","Windows 10 Version 1909 for x64-based Systems","Windows 10 Version 1909 for ARM64-based Systems","Windows 10 Version 1709 for 32-bit Systems","Windows 10 Version 1709 for x64-based Systems","Windows 10 Version 1709 for ARM64-based Systems","Windows 10 Version 1903 for 32-bit Systems","Windows 10 Version 1903 for x64-based Systems","Windows 10 Version 1903 for ARM64-based Systems","Windows 10 for 32-bit Systems","Windows 10 for x64-based Systems","Windows 10 Version 1607 for 32-bit Systems","Windows 10 Version 1607 for x64-based Systems","Windows Server 2016","Windows 7 for 32-bit Systems Service Pack 1","Windows 7 for x64-based Systems Service Pack 1","Windows 8.1 for 32-bit systems","Windows 8.1 for x64-based systems","Windows RT 8.1","Windows Server 2008 R2 for x64-based Systems Service Pack 1","Windows Server 2012","Windows Server 2012 R2"],"versions":[{"version":"1.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Internet Explorer 9","cpes":["cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"],"platforms":["Windows Server 2008 for 32-bit Systems Service Pack 2","Windows Server 2008 for x64-based Systems Service Pack 2"],"versions":[{"version":"1.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]}],"descriptions":[{"value":"A remote code execution vulnerability exists in the way that the MSHTML engine improperly validates input.\nAn attacker could execute arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\nIn a HTML editing attack scenario, an attacker could trick a user into editing a specially crafted file that is designed to exploit the vulnerability.\nThe security update addresses the vulnerability by modifying how MSHTML engine validates input.","lang":"en-US"}],"problemTypes":[{"descriptions":[{"description":"Remote Code Execution","lang":"en-US","type":"Impact"}]}],"providerMetadata":{"orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft","dateUpdated":"2024-05-29T16:33:15.294Z"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1567"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseSeverity":"MEDIUM","baseScore":4.2,"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T06:39:10.650Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1567"}]}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2020-1567","datePublished":"2020-08-17T19:13:45.000Z","dateReserved":"2019-11-04T00:00:00.000Z","dateUpdated":"2024-08-04T06:39:10.650Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}