A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'.
This indicates an attack attempt to exploit an Integer Overflow Vulnerability in Microsoft DNS Server.The vulnerability is caused by an error when the DNS Server handles a series of specially crafted DNS requests. Successful exploitation could result in arbitrary code execution in the DNS Server.
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1903 (Server Core installation)
Windows Server, version 1909 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Windows(4 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
WolfgangSesin | http://www.sesin.at | Source WolfgangSesin 1625287659177271298 | 2023/02/14 |
WolfgangSesin | https://www.sesin.at/2023/02/14/windows-dns-%e3%82%b5%e3%83... | Source WolfgangSesin 1625287659177271298 | 2023/02/14 |
www_sesin_at | http://www.sesin.at | Source www_sesin_at 1625287663287664642 | 2023/02/14 |
www_sesin_at | https://www.sesin.at/2023/02/14/windows-dns-%e3%82%b5%e3%83... | Source www_sesin_at 1625287663287664642 | 2023/02/14 |
WolfgangSesin | http://www.sesin.at | Source WolfgangSesin 1625287682623504385 | 2023/02/14 |
WolfgangSesin | https://www.sesin.at/2023/02/14/july-2020-security-update-c... | Source WolfgangSesin 1625287682623504385 | 2023/02/14 |
www_sesin_at | http://www.sesin.at | Source www_sesin_at 1625287687937597442 | 2023/02/14 |
www_sesin_at | https://www.sesin.at/2023/02/14/july-2020-security-update-c... | Source www_sesin_at 1625287687937597442 | 2023/02/14 |
List of frequently cited URLs
User | URL | Info Source |
---|---|---|
WolfgangSesin | sesin.at | Show Tweet |
WolfgangSesin | sesin.at | Show Tweet |
www_sesin_at | sesin.at | Show Tweet |
www_sesin_at | sesin.at | Show Tweet |
WolfgangSesin | sesin.at | Show Tweet |
WolfgangSesin | sesin.at | Show Tweet |
www_sesin_at | sesin.at | Show Tweet |
www_sesin_at | sesin.at | Show Tweet |
Name | URL |
---|---|
ZephrFish/CVE-2020-1350 | https://github.com/ZephrFish/CVE-2020-1350 |
maxpl0it/CVE-2020-1350-DoS | https://github.com/maxpl0it/CVE-2020-1350-DoS |
tinkersec/cve-2020-1350 | https://github.com/tinkersec/cve-2020-1350 |
psc4re/NSE-scripts | https://github.com/psc4re/NSE-scripts |
T13nn3s/CVE-2020-1350 | https://github.com/T13nn3s/CVE-2020-1350 |
captainGeech42/CVE-2020-1350 | https://github.com/captainGeech42/CVE-2020-1350 |
mr-r3b00t/CVE-2020-1350 | https://github.com/mr-r3b00t/CVE-2020-1350 |
corelight/SIGRed | https://github.com/corelight/SIGRed |
zoomerxsec/Fake_CVE-2020-1350 | https://github.com/zoomerxsec/Fake_CVE-2020-1350 |
connormcgarr/CVE-2020-1350 | https://github.com/connormcgarr/CVE-2020-1350 |
Name | URL |
---|---|
ZephrFish/CVE-2020-1350 | github.com |
maxpl0it/CVE-2020-1350-DoS | github.com |
tinkersec/cve-2020-1350 | github.com |
psc4re/NSE-scripts | github.com |
T13nn3s/CVE-2020-1350 | github.com |
captainGeech42/CVE-2020-1350 | github.com |
mr-r3b00t/CVE-2020-1350 | github.com |
corelight/SIGRed | github.com |
zoomerxsec/Fake_CVE-2020-1350 | github.com |
connormcgarr/CVE-2020-1350 | github.com |