Описание
Windows DNS Snap-in Remote Code Execution Vulnerability
FAQ
How could an attacker exploit the vulnerability?
An administrator would need to view a malicious record in the DNS Snap-in to allow exploitation this vulnerability.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | ||
Windows 7 for 32-bit Systems Service Pack 1 | ||
Windows 7 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | ||
Windows Server 2012 | ||
Windows Server 2012 (Server Core installation) |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
Older Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 80%
0.01415
Низкий
8.8 High
CVSS3
Связанные уязвимости
CVSS3: 8.8
github
около 3 лет назад
Windows DNS Snap-in Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-33749, CVE-2021-33750, CVE-2021-33756.
CVSS3: 8.8
fstec
около 4 лет назад
Уязвимость компонента dnsmgmt.msc операционной системы Windows, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 80%
0.01415
Низкий
8.8 High
CVSS3