DNS: Microsoft Windows DNS server Use After Free

This signature detects attempts to exploit a known vulnerability against DNS server in Microsoft Windows Server. A successful attack can lead to arbitrary code execution.

Extended Description

Use-after-free vulnerability in the DNS server in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted requests, aka "Windows DNS Use After Free Vulnerability."

Affected Products

Microsoft windows_server_2008

Short Name
DNS:CVE-2015-6125-UAF
Severity
Critical
Recommended
False
Recommended Action
None
Category
DNS
Keywords
After CVE-2015-6125 DNS Free Microsoft Use Windows server
Release Date
03/03/2020
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Occasionally
Vendors

Microsoft

CVSS Score

9.3

Found a potential security threat?