CVE-2015-6125

Use-after-free vulnerability in the DNS server in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted requests, aka "Windows DNS Use After Free Vulnerability."
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:*:gold:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*

History

21 Nov 2024, 02:34

Type Values Removed Values Added
References () http://www.securitytracker.com/id/1034323 - () http://www.securitytracker.com/id/1034323 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-127 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-127 -

Information

Published : 2015-12-09 11:59

Updated : 2024-11-21 02:34


NVD link : CVE-2015-6125

Mitre link : CVE-2015-6125

CVE.ORG link : CVE-2015-6125


JSON object : View

Products Affected

microsoft

  • windows_server_2008
  • windows_server_2012