Background
Patching the DNS Vulnerability via application code.
Lineage
- Microsoft – DNS – “Windows DNS Server Remote Code Execution Vulnerability” – CVE-2020-1350 – Remediation – Configuration – Registry
Link
Remediation
Microsoft
Advisory
Documentation
The advisory for the Security vulnerability is available @
Security Update Guide > Details
CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability
Security Vulnerability
Published: 07/14/2020 | Last Updated : 07/15/2020
MITRE CVE-2020-1350
Link
Supported OS
In the advisory the OSes that can be patched are listed.
The list includes
- 2008
- Windows 2008
- Windows 2008-R2
- 2012
- Windows 2012
- Windows 2012-R2
- 2016
- Windows 2016
- 2019
- Windows 2019
Patches
OS Patch – 2016
Our OS is MS Windows 2016, and the OS specific patch is KB4565511.
Artifacts
- Microsoft
- Microsoft Update Catalog
- KB4565511
Link
- KB4565511
- Microsoft Update Catalog
Files
Explanation
Please choose the cumulative update that models your OS:-
- Windows 10 Version 1607
- x86
- x64
- Windows Server 2016
Download
Please download the msu patch from the link listed above.
Apply Patch
Images
Image – Searching for updates on this computer
Image – already installed on this computer
References
- Microsoft