Skip to content
This repository has been archived by the owner on Apr 1, 2023. It is now read-only.
/ CVE-2020-1350 Public archive

This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service

Notifications You must be signed in to change notification settings

T13nn3s/CVE-2020-1350

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 

Repository files navigation

Warning This repository has been archived and is no longer actively maintained.

CVE-2020-1350

This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service.

Supported OS for this workaround script

Windows Server 2012 Windows Server 2012 R2 Windows Server 2016 Windows Server 2019

Note: Script is not supported (not tested) in Windows Server 2008 en Windows Server 2008 R2. Those operatingsystems are End-of-life.

KB4569509: Guidance for DNS Server Vulnerability CVE-2020-1350

https://support.microsoft.com/en-us/help/4569509/windows-dns-server-remote-code-execution-vulnerability

Please install the security patch

Microsoft has released the security patch, you can download the patch here: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1350

About

This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published