VYPR
Unrated severityNVD Advisory· Published Oct 16, 2020· Updated Aug 4, 2024

Jet Database Engine Remote Code Execution Vulnerability

CVE-2020-16924

Description

<p>A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.</p> <p>An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file.</p> <p>The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.</p>

Affected products

13
  • cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*+ 1 more
    • cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*range: 10.0.0
    • cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*range: 10.0.0
  • cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
    Range: 10.0.0
  • cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*
    Range: 10.0.0
  • Microsoft/Windows 10v52 versions
    cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*range: 10.0.0
    • cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*range: 10.0.0
  • cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*
    Range: 10.0.0
  • cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*
    Range: 10.0.0
  • cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
    Range: 10.0.0
  • Microsoft/Windows 7v52 versions
    cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*+ 1 more
    • cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*range: 6.1.0
    • cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*range: 6.1.0
  • cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*
    Range: 6.3.0
  • cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
    Range: 6.2.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.