Secure remote code execution on a Windows DNS server (patching guide)
Secure remote code execution on a Windows DNS server (patching guide)
In recent hours, Microsoft disclosed they fixed a remote code execution vulnerability in the Windows (server) DNS server (CVE-2020-1350). Existing patches and workarounds are available, but they must be implemented promptly. The details are summarized on the MSRC website; if you can't apply the fix, a registry workaround can temporarily reduce risk until a full patch is deployed. Note that this affects only server versions. A tweet on Twitter claims responsibility for the issue. Edited July 14, 2020 by Ben Mitchell – includes server focus and additional link.