Skip to main content

Microsoft Patches Windows Zero-Day Flaws Tied to DNSSEC

  • October 10, 2017
  • 1 reply
  • 1 view

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
See Also - Microsoft Security Bulletin Summary for October 2017
 
10th October 2017,  By Kelly Jackson Higgins
 
Security experts advise 'immediate' patching of critical DNS client vulnerabilities in Windows 8, 10, and other affected systems.
 Microsoft today issued patches for three critical vulnerabilities in the Windows DNS client in Windows 8, Windows 10, and Windows Server 2012 and 2016 that ironically came via a security feature.
 
The heap buffer-overflow flaws discovered by researchers at Bishop Fox – and fixed via the new CVE-2017-11779 security update amid Microsoft's October Patch Tuesday batch - could allow an attacker to wrest away full control of the targeted Windows machine without the victim taking any action at all. The bugs were found specifically in Microsoft's implementation of one of the data record features used in the secure Domain Name System protocol, DNSSEC.
 
Full Article.

1 reply

  • Community Guide
  • October 10, 2017
Good article thanks for the update Jeff