A remote code execution vulnerability exists when Windows improperly handles objects in memory. To exploit the vulnerability an attacker would have to convince a user to run a specially crafted application.
An attacker who successfully exploited this vulnerability could execute arbitrary code and take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
The updates address the vulnerability by correcting how Windows handles objects in memory.
No PoCs from references.
- https://github.com/404notf0und/CVE-Flow
- https://github.com/Cheroxx/Patch-Tuesday-Updates