CVE-2020-1256 (CNNVD-202009-416)
MEDIUM
中文标题:
Microsoft Windows GDI+ 信息泄露漏洞
英文标题:
Windows GDI Information Disclosure Vulnerability
CVSS分数:
5.5
发布时间:
2020-09-11 17:09:11
漏洞类型:
信息泄露
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
Microsoft Windows GDI+是美国微软(Microsoft)公司的一个Windows操作操作系统的图形设备接口。该软件是.NET框架的组成部分,负责在屏幕和打印机上绘制图形图像和显示信息。 Microsoft Windows GDI+ 中存在信息泄露漏洞。该漏洞源于不正确地处理内存中的对象。攻击者可利用该漏洞执行代码。以下产品及版本受到影响: Windows Server 2008 R2版本, Windows 10 1709版本, Windows Server 1903版本, Windows Server 2004版本, Windows 10 2004版本, Windows 10 1809版本, Windows RT 8.1版本, Windows Server 2016版本, Windows 8.1版本, Windows Server 2012版本, Windows 10版本, Windows Server 2012 R2版本, Windows 10 1803版本, Windows 7版本, Windows 10 1903版本, Windows Server 2019版本, Windows 10 1607版本。
英文描述:
NOT_EXTRACTED
CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Microsoft | Windows 10 Version 1803 | - | < publication | - |
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
|
| Microsoft | Windows 10 Version 1809 | - | < publication | - |
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*
|
| Microsoft | Windows Server 2019 | - | < publication | - |
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
|
| Microsoft | Windows Server 2019 (Server Core installation) | - | < publication | - |
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1709 for 32-bit Systems | 1709 | < publication | - |
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1709 | 1709 | < publication | - |
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1903 for 32-bit Systems | 1903 | < publication | - |
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1903 for x64-based Systems | 1903 | < publication | - |
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1903 for ARM64-based Systems | 1903 | < publication | - |
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*
|
| Microsoft | Windows Server, version 1903 (Server Core installation) | - | < publication | - |
cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 2004 | - | < publication | - |
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*
|
| Microsoft | Windows Server version 2004 | - | < publication | - |
cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*
|
| Microsoft | Windows 10 Version 1507 | - | < publication | - |
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*
|
| Microsoft | Windows 10 Version 1607 | - | < publication | - |
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*
|
| Microsoft | Windows Server 2016 | - | < publication | - |
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
|
| Microsoft | Windows Server 2016 (Server Core installation) | - | < publication | - |
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
|
| Microsoft | Windows 7 | - | < publication | - |
cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*
|
| Microsoft | Windows 7 Service Pack 1 | - | < publication | - |
cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*
|
| Microsoft | Windows 8.1 | - | < publication | - |
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*
|
| Microsoft | Windows Server 2008 R2 Service Pack 1 | - | < publication | - |
cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*
|
| Microsoft | Windows Server 2008 R2 Service Pack 1 (Server Core installation) | - | < publication | - |
cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*
|
| Microsoft | Windows Server 2012 | - | < publication | - |
cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
|
| Microsoft | Windows Server 2012 (Server Core installation) | - | < publication | - |
cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*
|
| Microsoft | Windows Server 2012 R2 | - | < publication | - |
cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
|
| Microsoft | Windows Server 2012 R2 (Server Core installation) | - | < publication | - |
cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*
|
| microsoft | windows_10 | - | - | - |
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1607 | - | - |
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1709 | - | - |
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1803 | - | - |
cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1809 | - | - |
cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 1903 | - | - |
cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*
|
| microsoft | windows_10 | 2004 | - | - |
cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*
|
| microsoft | windows_7 | - | - | - |
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
|
| microsoft | windows_8.1 | - | - | - |
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
|
| microsoft | windows_rt_8.1 | - | - | - |
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
|
| microsoft | windows_server_2008 | r2 | - | - |
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
|
| microsoft | windows_server_2012 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
|
| microsoft | windows_server_2012 | r2 | - | - |
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | 1903 | - | - |
cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*
|
| microsoft | windows_server_2016 | 2004 | - | - |
cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*
|
| microsoft | windows_server_2019 | - | - | - |
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题
x_refsource_MISC
cve.org
访问
cve.org
CVSS评分详情
3.1 (cna)
MEDIUM
5.5
CVSS向量:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
机密性
HIGH
完整性
NONE
可用性
NONE
时间信息
发布时间:
2020-09-11 17:09:11
修改时间:
2024-08-04 06:31:59
创建时间:
2025-11-11 15:36:00
更新时间:
2025-11-11 15:56:27
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-1256 |
2025-11-11 15:20:27 | 2025-11-11 07:36:00 |
| NVD | nvd_CVE-2020-1256 |
2025-11-11 14:57:03 | 2025-11-11 07:44:28 |
| CNNVD | cnnvd_CNNVD-202009-416 |
2025-11-11 15:10:29 | 2025-11-11 07:56:27 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:56:27
vulnerability_type: 未提取 → 信息泄露; cnnvd_id: 未提取 → CNNVD-202009-416; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 信息泄露
- cnnvd_id: 未提取 -> CNNVD-202009-416
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:44:28
affected_products_count: 25 → 42; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- affected_products_count: 25 -> 42
- data_sources: ['cve'] -> ['cve', 'nvd']