Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2020-16921: Windows Text Services Framework Information Disclosure Vulnerability

Back to Search

Microsoft CVE-2020-16921: Windows Text Services Framework Information Disclosure Vulnerability

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
10/13/2020
Created
10/14/2020
Added
10/13/2020
Modified
11/18/2021

Description

An information disclosure vulnerability exists in Text Services Framework when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. To exploit this vulnerability, an attacker would have to log on to an affected system and open a specially crafted file. The update addresses the vulnerability by correcting how Text Services Framework handles objects in memory.

Solution(s)

  • msft-kb4577668-79a95e38-d1bc-434b-8a49-eb0e05941333
  • msft-kb4577668-965a8ede-1eb7-46d6-83a6-7246ea98aae0
  • msft-kb4577668-b815915f-3e4f-46ae-adc9-b90cd4b04100
  • msft-kb4577671-4bc3ccc3-fcb0-4bbd-a2a5-cbbd40369d41
  • msft-kb4577671-60a68333-26ce-47b6-9254-89d69caedfdf
  • msft-kb4577671-a4f7dcc3-65f1-4a75-8635-ea596100c299
  • msft-kb4577671-c4223a46-1f35-41d8-ac8e-d2772d017f90
  • msft-kb4577671-c42dc613-fb5b-4c45-925c-4f508584a635
  • msft-kb4577671-ddbf4c81-6ca7-4986-999e-9275ef508017
  • msft-kb4579311-d5cbc800-cb34-49c3-bde8-aa2f0ee05b2e
  • msft-kb4579311-e9f0550d-b150-4eeb-bf5e-1a08b117e7af
  • msft-kb4579311-fa30a6bc-24ef-47b0-a6fa-d7971053e058
  • msft-kb4580328-ebb00bd7-bff6-4567-8b7c-300728513137
  • msft-kb4580328-f01aa891-eec2-4390-9974-dc226f4d6bf4
  • msft-kb4580330-c2c988c8-cbbe-4a10-a26f-365b656443f3
  • msft-kb4580330-fc2b1c51-dad6-4170-ba4d-85c43ed047d1

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;