An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object. To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_10 | Microsoft | 1803 (including) | 1803 (including) |
Windows_10 | Microsoft | 1809 (including) | 1809 (including) |
Windows_10 | Microsoft | 1903 (including) | 1903 (including) |
Windows_10 | Microsoft | 1909 (including) | 1909 (including) |
Windows_10 | Microsoft | 2004 (including) | 2004 (including) |
Windows_server_2016 | Microsoft | 1903 (including) | 1903 (including) |
Windows_server_2016 | Microsoft | 1909 (including) | 1909 (including) |
Windows_server_2016 | Microsoft | 2004 (including) | 2004 (including) |
Windows_server_2019 | Microsoft | - (including) | - (including) |