VID |
26771 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Hotfix (MS16-071, 3164065) for 'Security Update for Microsoft Windows DNS Server' has not been applied.
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted requests to a DNS server.
Windows DNS Server Use After Free Vulnerability ? CVE-2016-3227 A remote code execution vulnerability exists in Windows Domain Name System (DNS) servers when they fail to properly handle requests. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account. Windows servers that are configured as DNS servers are at risk from this vulnerability.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://technet.microsoft.com/en-us/library/security/ms16-071
* Platforms Affected: Windows Server 2012 Windows Server 2012 R2 |
Recommendation |
Apply the appropriate patch(3164065) for your system, as listed in Microsoft Security Bulletin MS16-071 at https://technet.microsoft.com/en-us/library/security/ms16-071 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2016-3227 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|