Remote code execution in Windows DNSAPI

Published: 2017-10-10 23:38:06
Severity High
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2017-11779
CVSSv3 8.7 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-20
Exploitation vector Network
Public exploit Not available
Vulnerable software Windows
Windows Server
Vulnerable software versions Windows 8.1
Windows 10
Windows RT 8.1
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016
Vendor URL Microsoft

Security Advisory

1) Improper input validation

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists in Windows Domain Name System (DNS) DNSAPI.dll when it fails to properly handle DNS responses. A remote attacker can corrupted DNS responses to DNS server and execute arbitrary code in the context of the Local System Account.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Remediation

Install updates from vendor's website.

External links

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11779

Back to List