Windows DNS Server allows a denial of service vulnerability when Microsoft Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 Gold and R2, and Windows Server 2016 are configured to answer version queries, aka "Windows DNS Server Denial of Service Vulnerability".
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/98097 | Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0171 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/98097 | Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0171 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/98097 - Third Party Advisory, VDB Entry | |
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0171 - Patch, Vendor Advisory |
Information
Published : 2017-05-12 14:29
Updated : 2024-11-21 03:02
NVD link : CVE-2017-0171
Mitre link : CVE-2017-0171
CVE.ORG link : CVE-2017-0171
JSON object : View
Products Affected
microsoft
- windows_server_2008
- windows_server_2016
- windows_server_2012
CWE
CWE-20
Improper Input Validation