CERT-In Vulnerability Note
CIVN-2015-0299
Windows DNS Use-After-Free vulnerability
Original Issue Date:December 09, 2015
Severity Rating: HIGH
Software Affected
- Windows Server 2008 for 32-bit Systems SP 2 (Server Core installation also affected)
- Windows Server 2008 for x64-bit Systems SP 2 (Server Core installation also affected)
- Windows Server 2008 R2 for x64-bit Systems SP 1 (Server Core installation also affected)
- Windows Server 2012 (Server Core installation also affected)
- Windows Server 2012 R2 (Server Core installation also affected)
Overview
A vulnerability has been reported in Microsoft Windows Server, which could be exploited by a remote attacker to execute arbitrary code and completely compromise the affected system.
Description
This vulnerability exists in Microsoft Windows DNS server due to improper parsing of DNS requests.
A remote attacker could exploit this vulnerability by sending specially crafted DNS requests, to execute arbitrary code in the context of the Local System Account. Failed exploit attempts will result in denial-of-service (DoS) conditions.
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS15-127
Vendor Information
Microsoft
https://technet.microsoft.com/library/security/MS15-127
References
Microsoft
https://technet.microsoft.com/library/security/MS15-127
SecurityTracker
http://www.securitytracker.com/id/1034323
Symantec
https://www.symantec.com/security_response/vulnerability.jsp?bid=78496
CVE Name
CVE-2015-6125
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|