Microsoft Windows DNS servers are vulnerable to heap overflow attacks, enabling unauthenticated attackers to send malicious requests to affected servers.
CWE-122: Heap-based Buffer Overflow - CVE-2018-8626
Microsoft Windows Domain Name System (DNS) servers are vulnerable to heap overflow attacks. Microsoft acknowledges that "an attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account." This remote code execution vulnerability exists in Windows DNS servers when they fail to properly handle requests.
Windows servers that are configured as DNS servers are at risk from this vulnerability. A successful attack could allow the execution of arbitrary code. Symantec also notes that an unsuccessful attack results in a denial-of-service.
Apply an update
Updated: January 04, 2019
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Thanks to Mitch Adair from Microsoft for reporting this vulnerability.
This document was written by Eric Hatleback.
|Date First Published:||2019-01-04|
|Date Last Updated:||2019-01-04 18:01 UTC|