Better patch Windows Server ASAP as remotely exploitable vulnerability found

Reading time icon 1 min. read


Readers help support MSPoweruser. When you make a purchase using links on our site, we may earn an affiliate commission. Tooltip Icon

Read the affiliate disclosure page to find out how can you help MSPoweruser effortlessly and without spending any money. Read more

IT staff are not often the fastest to install patches, lest they cause more issues than they solve, but a new vulnerability in all versions of Windows 10 and Windows Server suggests they may need to rethink that policy.

The CERT Coordination Center (CERT/CC) today issued CVE-2018-8626 for a Windows DNS server heap overflow vulnerability. The remote code execution flaw in Windows DNS servers will allow unauthorized actors to run arbitrary code in the context of the Local System Account. Windows PCs and servers configured as DNS servers are at risk.

As if synchronized, Microsoft also issued an advisory for CVE-2018-8611, a Windows kernel elevation of privilege bug that would let a hacker run arbitrary code in kernel mode. They could then install programs and view, change, or delete data, or create new accounts with full user rights.

Fortunately, the DNS server exploit has not been released yet, but smarter hackers are often able to reverse engineer exploits from patches. The privilege elevation vulnerability is already being exploited in the wild.

Read more about the exploits and find the download links for the patches at the links above.

Via DarkReading.com

More about the topics: exploit, microsoft, security, windows 10, windows server

Leave a Reply

Your email address will not be published. Required fields are marked *