See Also - Microsoft Security Bulletin Summary for October 2017
10th October 2017, By Kelly Jackson Higgins
Security experts advise 'immediate' patching of critical DNS client vulnerabilities in Windows 8, 10, and other affected systems.
Microsoft today issued patches for three critical vulnerabilities in the Windows DNS client in Windows 8, Windows 10, and Windows Server 2012 and 2016 that ironically came via a security feature.
The heap buffer-overflow flaws discovered by researchers at Bishop Fox – and fixed via the new CVE-2017-11779 security update amid Microsoft's October Patch Tuesday batch - could allow an attacker to wrest away full control of the targeted Windows machine without the victim taking any action at all. The bugs were found specifically in Microsoft's implementation of one of the data record features used in the secure Domain Name System protocol, DNSSEC.
Full Article.
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.