Skip to content

jmaddington/dRMM-CVE-2020-1350-response

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Overview

Microsoft announced CVE-2020-1350 on July 14 2020. This vulnerability in Windows DNS server goes back to Server 2003 and is broadly thought to be wormable.

This script follows the intructions from KB456509 (https://support.microsoft.com/en-us/help/4569509/windows-dns-server-remote-code-execution-vulnerability) to mitigate the issues without rebooting the server.

For Datto RMM users, you can import aem-component.cpt into the RMM. For other RMM users, the script simply needs command.bat and TcpRecievePacketSize.reg to work.

Caveats

This script is only a few hours old and is not thoroughly tested. It based on the best information we have available from Microsoft right now.

Use at your own risk.

About

Windows registry mitigation response to CVE-2020-1350

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published