First published: Fri Oct 13 2017(Updated: )
The Microsoft Windows Domain Name System (DNS) DNSAPI.dll on Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly handle DNS responses, aka "Windows DNSAPI Remote Code Execution Vulnerability".
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1511 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-11779 has been rated as critical due to its potential for remote code execution.
To mitigate CVE-2017-11779, apply the appropriate security updates provided by Microsoft for affected Windows versions.
CVE-2017-11779 impacts multiple versions including Windows 8.1, Windows 10 and its specific builds, as well as Windows Server 2012 R2 and 2016.
CVE-2017-11779 can be exploited through specially crafted DNS responses that cause remote code execution.
Yes, CVE-2017-11779 is publicly documented as a critical vulnerability in Microsoft Windows.