CVE-2024-26231Use After Free in Microsoft Windows Server 2016

CWE-416Use After Free6 documents5 sources
Severity
6.6MEDIUMNVD
EPSS
2.7%
top 14.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 9

Description

Windows DNS Server Remote Code Execution Vulnerability

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.7 | Impact: 5.9

Affected Packages8 packages

CVEListV5microsoft/windows_server_201610.0.14393.010.0.14393.6897
CVEListV5microsoft/windows_server_201910.0.17763.010.0.17763.5696
CVEListV5microsoft/windows_server_202210.0.20348.010.0.20348.2402

🔴Vulnerability Details

1
GHSA
GHSA-89j9-gpmp-c355: Windows DNS Server Remote Code Execution Vulnerability2024-04-09

📋Vendor Advisories

1
Microsoft
Windows DNS Server Remote Code Execution Vulnerability2024-04-09

🕵️Threat Intelligence

3
Trendmicro
The April 2024 Security Updates Review2024-04-09
Bleepingcomputer
Microsoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEs2024-04-09
Trendmicro
The April 2024 Security Updates Review2024-04-09
CVE-2024-26231 — Use After Free in Microsoft | cvebase