Vulnerability Details : CVE-2015-6125
Use-after-free vulnerability in the DNS server in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted requests, aka "Windows DNS Use After Free Vulnerability."
Vulnerability category: Memory CorruptionExecute code
Exploit prediction scoring system (EPSS) score for CVE-2015-6125
Probability of exploitation activity in the next 30 days: 94.87%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 99 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2015-6125
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
nvd@nist.gov |
References for CVE-2015-6125
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-127
Microsoft Security Bulletin MS15-127 - Critical | Microsoft Docs
-
http://www.securitytracker.com/id/1034323
Microsoft Windows DNS Use-After-Free Memory Error Lets Remote Users Execute Arbitrary Code on the Target System - SecurityTracker
Products affected by CVE-2015-6125
- cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:*:gold:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*