T13nn3s / CVE-2020-1350

This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Warning This repository has been archived and is no longer actively maintained.

CVE-2020-1350

This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service.

Supported OS for this workaround script

Windows Server 2012 Windows Server 2012 R2 Windows Server 2016 Windows Server 2019

Note: Script is not supported (not tested) in Windows Server 2008 en Windows Server 2008 R2. Those operatingsystems are End-of-life.

KB4569509: Guidance for DNS Server Vulnerability CVE-2020-1350

https://support.microsoft.com/en-us/help/4569509/windows-dns-server-remote-code-execution-vulnerability

Please install the security patch

Microsoft has released the security patch, you can download the patch here: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350

About

This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service


Languages

Language:PowerShell 100.0%