支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 0af2c6038efc6991cd9857fbf338d600d0d40902

来源
关联漏洞
标题:Microsoft Windows DNS Server 输入验证错误漏洞 (CVE-2020-1350)
Description:Microsoft Windows是美国微软(Microsoft)公司的一套个人设备使用的操作系统。 Microsoft Windows DNS Server 存在输入验证错误漏洞,该漏洞源于程序无法正确处理请求。攻击者可通过发送恶意的请求利用该漏洞在本地系统帐户的上下文中运行任意代码。以下产品及版本受到影响:Windows Server 2008 SP2,Windows Server 2008 R2 SP1,Windows Server 2012,Windows Server 2012 R2,Windo
Description
This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service
介绍
> **Warning**
> This repository has been archived and is no longer actively maintained.

# CVE-2020-1350
This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service.

## Supported OS for this workaround script
Windows Server 2012
Windows Server 2012 R2
Windows Server 2016 
Windows Server 2019

Note: Script is not supported (not tested) in Windows Server 2008 en Windows Server 2008 R2. Those operatingsystems are End-of-life.

## KB4569509: Guidance for DNS Server Vulnerability CVE-2020-1350
https://support.microsoft.com/en-us/help/4569509/windows-dns-server-remote-code-execution-vulnerability

## Please install the security patch 
Microsoft has released the security patch, you can download the patch here: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350
文件快照

[4.0K] /data/pocs/0af2c6038efc6991cd9857fbf338d600d0d40902 ├── [7.7K] CVE-2020-1350-checker.ps1 └── [ 875] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。