A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_10 | Microsoft | - (including) | - (including) |
Windows_10 | Microsoft | 1607 (including) | 1607 (including) |
Windows_10 | Microsoft | 1703 (including) | 1703 (including) |
Windows_10 | Microsoft | 1709 (including) | 1709 (including) |
Windows_10 | Microsoft | 1803 (including) | 1803 (including) |
Windows_10 | Microsoft | 1809 (including) | 1809 (including) |
Windows_10 | Microsoft | 1903 (including) | 1903 (including) |
Windows_7 | Microsoft | –sp1 (including) | –sp1 (including) |
Windows_8.1 | Microsoft | - (including) | - (including) |
Windows_rt_8.1 | Microsoft | - (including) | - (including) |
Windows_server_2008 | Microsoft | –sp2 (including) | –sp2 (including) |
Windows_server_2008 | Microsoft | r2-sp1 (including) | r2-sp1 (including) |
Windows_server_2012 | Microsoft | - (including) | - (including) |
Windows_server_2012 | Microsoft | r2 (including) | r2 (including) |
Windows_server_2016 | Microsoft | - (including) | - (including) |
Windows_server_2016 | Microsoft | 1803 (including) | 1803 (including) |
Windows_server_2016 | Microsoft | 1903 (including) | 1903 (including) |
Windows_server_2019 | Microsoft | - (including) | - (including) |