{"vuid":"VU#531281","idnumber":"531281","name":"Microsoft Windows DNS servers are vulnerable to heap overflow","keywords":["Microsoft","Windows","heap overflow","DNS"],"overview":"Microsoft Windows DNS servers are vulnerable to heap overflow attacks, enabling unauthenticated attackers to send malicious requests to affected servers.","clean_desc":"CWE-122:Heap-based Buffer Overflow - CVE-2018-8626 Microsoft Windows Domain Name System(DNS)servers are vulnerable to heap overflow attacks. Microsoft acknowledges that\"an attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account.\"This remote code execution vulnerability exists in Windows DNS servers when they fail to properly handle requests.","impact":"Windows servers that are configured as DNS servers are at risk from this vulnerability. A successful attack could allow the execution of arbitrary code. Symantec also notes that an unsuccessful attack results in a denial-of-service.","resolution":"Apply an update Apply the security update available from Microsoft.","workarounds":"","sysaffected":"","thanks":"Thanks to Mitch Adair from Microsoft for reporting this vulnerability.","author":"This document was written by Eric Hatleback.","public":["https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8626","https://cwe.mitre.org/data/definitions/122.html","https://www.symantec.com/security-center/vulnerabilities/writeup/106076","https://www.us-cert.gov/ncas/current-activity/2018/12/11/Microsoft-Releases-December-2018-Security-Updates"],"cveids":["CVE-2018-8626"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2019-01-03T20:31:42Z","publicdate":"2018-11-12T00:00:00Z","datefirstpublished":"2019-01-04T18:01:12Z","dateupdated":"2019-01-04T18:01:12Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"9.7","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:C/A:P","cvss_temporalscore":"9.7","cvss_environmentalscore":"9.66818146224","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}