MS.Windows.DHCP.Server.Vendor.Options.Code.Execution
Description
This indicates an attack attempt againts a Buffer Overflow vulnerability in Microsoft Windows DHCP Server.
A remote attacker can exploit this vulnerability by sending crafted DHCP requests. Successful exploitation may result in the attacker being able to execute arbitrary code within the context of the application.
Affected Products
Microsoft Windows 7
Microsoft Windows 8.1
Microsoft Windows 10
Microsoft Windows RT 8.1
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor:
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0626
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-11 | 14.630 | Name:Microsoft. Windows. DHCP. Server. Vendor. Options. Code. Execution:MS. Windows. DHCP. Server. Vendor. Options. Code. Execution |
2019-05-07 | 14.608 | Sig Added |
2019-04-05 | 14.587 | Sig Added |
2019-03-26 | 14.580 | Default_action:pass:drop |
2019-03-13 | 14.572 | Sig Added |
2019-02-26 | 14.560 |