Vulnerability Description
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Word functions handle objects in memory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | 365 Apps | - |
| Microsoft | Office | 2010 |
| Microsoft | Office Online Server | - |
| Microsoft | Office Web Apps | 2010 |
| Microsoft | Sharepoint Enterprise Server | 2013 |
| Microsoft | Sharepoint Server | 2010 |
| Microsoft | Word | 2010 |
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1583PatchVendor Advisory
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1583PatchVendor Advisory
FAQ
What is CVE-2020-1583?
CVE-2020-1583 is a vulnerability with a CVSS score of 8.8 (HIGH). An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise ...
How severe is CVE-2020-1583?
CVE-2020-1583 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-1583?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft 365 Apps, Microsoft Office, Microsoft Office Online Server, Microsoft Office Web Apps, Microsoft Sharepoint Enterprise Server.