Описание
Windows DNS Server Remote Code Execution Vulnerability
FAQ
If my server is not configured to be a DNS server, it is vulnerable?
No, this vulnerability is only exploitable if the server is configured to be a DNS server.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | ||
Windows Server 2012 | ||
Windows Server 2012 (Server Core installation) | ||
Windows Server 2012 R2 | ||
Windows Server 2012 R2 (Server Core installation) |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation More Likely
Older Software Release
Exploitation More Likely
DOS
N/A
EPSS
Процентиль: 94%
0.12438
Средний
9.8 Critical
CVSS3
Связанные уязвимости
CVSS3: 9.8
github
около 3 лет назад
Windows DNS Server Remote Code Execution Vulnerability
CVSS3: 9.8
fstec
больше 4 лет назад
Уязвимость службы DNS-сервера операционных систем Windows, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 94%
0.12438
Средний
9.8 Critical
CVSS3