Vulnerability Details : CVE-2015-6125
Use-after-free vulnerability in the DNS server in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted requests, aka "Windows DNS Use After Free Vulnerability."
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2015-6125
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:*:gold:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-6125
91.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-6125
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
References for CVE-2015-6125
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-127
Microsoft Security Bulletin MS15-127 - Critical | Microsoft Docs
-
http://www.securitytracker.com/id/1034323
Microsoft Windows DNS Use-After-Free Memory Error Lets Remote Users Execute Arbitrary Code on the Target System - SecurityTracker
Jump to