First published: Thu Jun 16 2016(Updated: )
Use-after-free vulnerability in the DNS Server component in Microsoft Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted requests, aka "Windows DNS Server Use After Free Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | =gold | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server | =r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3227 is rated as critical due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2016-3227, apply the security updates provided by Microsoft for affected versions of Windows Server 2012.
CVE-2016-3227 affects the DNS Server component in Microsoft Windows Server 2012 Gold and R2.
CVE-2016-3227 can be exploited by remote attackers through crafted DNS requests.
The potential impacts of CVE-2016-3227 include unauthorized remote code execution and possible system compromise.