A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on the client machine. To exploit the vulnerability, an attacker could send specially crafted DHCP responses to a client. The security update addresses the vulnerability by correcting how Windows DHCP clients handle certain DHCP responses.
2019-08-14T21:15:13.097
2024-11-21T04:17:11.943
Modified
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | microsoft | windows_10 | - | Yes |
Operating System | microsoft | windows_10 | 1607 | Yes |
Operating System | microsoft | windows_10 | 1703 | Yes |
Operating System | microsoft | windows_10 | 1709 | Yes |
Operating System | microsoft | windows_10 | 1803 | Yes |
Operating System | microsoft | windows_7 | - | Yes |
Operating System | microsoft | windows_8.1 | - | Yes |
Operating System | microsoft | windows_rt_8.1 | - | Yes |
Operating System | microsoft | windows_server_2008 | - | Yes |
Operating System | microsoft | windows_server_2008 | r2 | Yes |
Operating System | microsoft | windows_server_2008 | r2 | Yes |
Operating System | microsoft | windows_server_2012 | - | Yes |
Operating System | microsoft | windows_server_2012 | r2 | Yes |
Operating System | microsoft | windows_server_2016 | - | Yes |
Operating System | microsoft | windows_server_2016 | 1803 | Yes |