{"containers":{"cna":{"title":"Microsoft Office Click-to-Run Elevation of Privilege Vulnerability","datePublic":"2020-08-11T07:00:00.000Z","affected":[{"vendor":"Microsoft","product":"Microsoft Office 2013 Click-to-Run (C2R)","cpes":["cpe:2.3:a:microsoft:office:2013:*:*:*:click-to-run:*:x86:*","cpe:2.3:a:microsoft:office:2013:*:*:*:click-to-run:*:x64:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"15.0.0.0","lessThan":"15.0.5571.1000","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Office 2019","cpes":["cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"19.0.0","lessThan":"https://aka.ms/OfficeSecurityReleases","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft 365 Apps for Enterprise","cpes":["cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*"],"platforms":["32-bit Systems","x64-based Systems"],"versions":[{"version":"16.0.1","lessThan":"https://aka.ms/OfficeSecurityReleases","versionType":"custom","status":"affected"}]}],"descriptions":[{"value":"An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) components handle objects in memory. An attacker who successfully exploited the vulnerability could elevate privileges. The attacker would need to already have the ability to execute code on the system.\nAn attacker could exploit this vulnerability by running a specially crafted application on the victim system.\nThe security update addresses the vulnerability by correcting how Microsoft Office Click-to-Run (C2R) components handle objects in memory.","lang":"en-US"}],"problemTypes":[{"descriptions":[{"description":"Elevation of Privilege","lang":"en-US","type":"Impact"}]}],"providerMetadata":{"orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft","dateUpdated":"2024-05-29T16:33:20.685Z"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1581"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T06:39:10.426Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1581"}]}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2020-1581","datePublished":"2020-08-17T19:13:50.000Z","dateReserved":"2019-11-04T00:00:00.000Z","dateUpdated":"2024-08-04T06:39:10.426Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}