Vulnerabilities > CVE-2015-6125 - Unspecified vulnerability in Microsoft Windows Server 2008 and Windows Server 2012

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
microsoft
nessus

Summary

Use-after-free vulnerability in the DNS server in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted requests, aka "Windows DNS Use After Free Vulnerability."

Msbulletin

bulletin_idMS15-127
bulletin_url
date2015-12-08T00:00:00
impactRemote Code Execution
knowledgebase_id3100465
knowledgebase_url
severityCritical
titleSecurity Update for Microsoft Windows DNS to Address Remote Code Execution

Nessus

NASL familyWindows : Microsoft Bulletins
NASL idSMB_NT_MS15-127.NASL
descriptionThe remote Windows host is affected by a remote code execution vulnerability in the Windows Domain Name System (DNS) server due to improper parsing of DNS requests. A remote attacker can exploit this, via specially crafted DNS requests, to execute arbitrary code in the context of the Local System Account.
last seen2020-06-01
modified2020-06-02
plugin id87256
published2015-12-08
reporterThis script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/87256
titleMS15-127: Security Update for Microsoft Windows DNS to Address Remote Code Execution (3100465)