Microsoft Windows DNS Query Vulnerability
Last Update Date:
13 Apr 2011 16:43
Release Date:
13 Apr 2011
6095
Views
RISK: High Risk
TYPE: Operating Systems - Windows OS
A remote code execution vulnerability exists in the way that the DNS client service handles specially crafted LLMNR queries. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the NetworkService account. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Impact
- Elevation of Privilege
- Remote Code Execution
System / Technologies affected
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7
- Windows Server 2008 R2
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
http://www.microsoft.com/technet/security/bulletin/MS11-030.mspx#ERC
Vulnerability Identifier
Source
Related Link
Share with