Windows Domain Name System Lets Remote Users Execute Arbitrary Code on the Target System
|
SecurityTracker Alert ID: 1039533 |
SecurityTracker URL: http://securitytracker.com/id/1039533
|
CVE Reference:
CVE-2017-11779
(Links to External Site)
|
Date: Oct 10 2017
|
Impact:
Execution of arbitrary code via network, Root access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 8.1, RT 8.1, 2012, 2012 R2, 2016, 10, 10 Version 1511, 10 Version 1607, 10 Version 1703
|
Description:
A vulnerability was reported in Windows Domain Name System. A remote user can execute arbitrary code on the target system.
A remote user can return a specially crafted DNS response to trigger a flaw in 'DNSAPI.dll' and execute arbitrary code on the target Windows Domain Name System service. The code will run with Local System privileges.
Nelson William Gamazo Sanchez - Trend Micro (via Trend Micro's Zero Day Initiative) and Nick Freeman of Bishop Fox reported this vulnerability.
|
Impact:
A remote user can execute arbitrary code on the target system.
|
Solution:
The vendor has issued a fix.
The Microsoft advisories are available at:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11779
|
Vendor URL: portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11779 (Links to External Site)
|
Cause:
Not specified
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|