Microsoft DNS Server Remote Code Execution (SIGRed)

critical Nessus Plugin ID 138554

Synopsis

The DNS server running on the remote host is affected by a remote code execution vulnerability.

Description

According to its self-reported version number, the Microsoft DNS Server running on the remote host is affected by a remote code execution vulnerability. An unauthenticated, remote attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account.

Note that in order to get the full Microsoft DNS server version, the EnableVersionQuery DNS setting would need to be set to 1.

Solution

Microsoft has released a set of patches for Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016, 2019, version 1903, 1909, and 2004.

See Also

http://www.nessus.org/u?22a53c13

Plugin Details

Severity: Critical

ID: 138554

File Name: ms_dns_cve-2020-1350.nasl

Version: 1.6

Type: remote

Family: DNS

Published: 7/16/2020

Updated: 11/30/2021

Risk Information

CVSS Score Source: CVE-2020-1350

VPR

Risk Factor: Critical

Score: 10

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: ms_dns/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/14/2020

Vulnerability Publication Date: 7/14/2020

CISA Known Exploited Dates: 7/24/2020

Reference Information

CVE: CVE-2020-1350

IAVA: 2020-A-0299

MSKB: 4558998, 4565483, 4565503, 4565511, 4565524, 4565529, 4565535, 4565536, 4565537, 4565539, 4565540, 4565541

MSFT: MS20-4558998, MS20-4565483, MS20-4565503, MS20-4565511, MS20-4565524, MS20-4565529, MS20-4565535, MS20-4565536, MS20-4565537, MS20-4565539, MS20-4565540, MS20-4565541