Microsoft Outlook Security Feature Bypass Vulnerability - CVE-2020-0696ID: oval:org.secpod.oval:def:61280 | Date: (C)2020-02-13 (M)2024-05-20 |
Class: VULNERABILITY | Family: windows |
A security feature bypass vulnerability exists in Microsoft Outlook software when it improperly handles the parsing of URI formats. The security feature bypass by itself does not allow arbitrary code execution. However, to successfully exploit the vulnerability, an attacker would have to use it in conjunction with another vulnerability, such as a remote code execution vulnerability, to take advantage of the security feature bypass vulnerability and run arbitrary code. To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted URI with an affected version of Microsoft Outlook software. The security update addresses the vulnerability by correcting how Microsoft Outlook handles the parsing of URI formats.
Platform: |
Microsoft Windows Server 2022 |
Microsoft Windows 11 |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows 10 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Product: |
Microsoft Outlook 2010 |
Microsoft Outlook 2013 |
Microsoft Outlook 2016 |
Microsoft 365 Apps for Enterprise |
Microsoft Office 2019 |