![]() ![]() We strongly recommend that server administrators apply the security update at their earliest convenience.Ī registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. ![]() This advisory describes a Critical Remote Code Execution (RCE) vulnerability that affects Windows servers that are configured to run the DNS Server role. On July 14, 2020, Microsoft released a security update for the issue that is described in CVE-2020-1350 | Windows DNS Server Remote Code Execution Vulnerability. Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for 圆4-based Systems Service Pack 2 Windows Server 2008 for 圆4-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for 圆4-based Systems Service Pack 1 Windows Server 2008 R2 for 圆4-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 (Server Core installation) Windows Server 2012 R2 (Server Core installation) Windows Server 2016 (Server Core installation) Windows Server 2019 (Server Core installation) Windows Server, version 1803 (Server Core Installation) Windows Server, version 1903 (Server Core installation) Windows Server, version 1909 (Server Core installation) Windows Server, version 2004 (Server Core installation) This article specifically applies to the following Windows server versions: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |