First published: Wed Dec 12 2018(Updated: )
A remote code execution vulnerability exists in Windows Domain Name System (DNS) servers when they fail to properly handle requests, aka "Windows DNS Server Heap Overflow Vulnerability." This affects Windows Server 2012 R2, Windows Server 2019, Windows Server 2016, Windows 10, Windows 10 Servers.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | =1607 | |
Windows 10 | =1709 | |
Windows 10 | =1803 | |
Windows 10 | =1809 | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1709 | |
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2019 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8626 is classified as a critical remote code execution vulnerability affecting multiple Windows platforms.
To mitigate CVE-2018-8626, ensure that you apply the latest security updates provided by Microsoft for your affected Windows version.
CVE-2018-8626 impacts Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, and multiple versions of Windows 10.
Exploitation of CVE-2018-8626 can allow an attacker to execute arbitrary code on a vulnerable DNS server.
While updating your systems is the best approach, disabling unnecessary services can serve as a temporary workaround against CVE-2018-8626.