CVE-2015-6125Improper Validation of Certificate with Host Mismatch in Microsoft Windows Server 2008

Severity
9.3CRITICALNVD
EPSS
59.2%
top 1.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9
Latest updateMay 14

Description

Use-after-free vulnerability in the DNS server in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted requests, aka "Windows DNS Use After Free Vulnerability."

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages1 packages

🔴Vulnerability Details

1
GHSA
GHSA-26g4-3p64-cvvp: Use-after-free vulnerability in the DNS server in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allows remote attackers to2022-05-14

📋Vendor Advisories

1
Red Hat
ruby: OpenSSL extension hostname matching implementation violates RFC 61252015-03-30

🕵️Threat Intelligence

2
Talos
Microsoft Patch Tuesday - December 20152015-12-08
Talos
Microsoft Patch Tuesday - December 20152015-12-08

💬Community

2
Bugzilla
CVE-2015-7826 botan: acceptance of invalid certificate names2016-02-24
Bugzilla
CVE-2015-1855 ruby: OpenSSL extension hostname matching implementation violates RFC 61252015-04-08