CVE-2020-1350 SIGRed PoC Demo - Microsoft Windows DNS Server DoS Vulnerability

preview_player
Показать описание
This vulnerability has been identified by researchers from CheckPoint and Microsoft as Critical with the ability to perform Remote Code Execution. In this Proof of Concept, the vulnerability is designed to crash the DNS Server as a Denial of Service.

➨ Versions Affected:
Server 2008
Server 2008 R2
Server 2012
Server 2012 R2
Server 2016
Server 2019

➨ Workaround:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters]
DWORD = TcpReceivePacketSize
Value = 0xFF00
* Note: A restart of the DNS Service is required to take effect.

➨ Great Researchers:

➨ Additional Resources:
Рекомендации по теме
Комментарии
Автор

Can you please share step by step for this PoC

anubhawiway
Автор

Looks like it's time to update again. How are you preparing to deploy patches?

thejonathansinger