vulnerability
Microsoft Windows: CVE-2017-11779: Windows DNSAPI Remote Code Execution Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:C/I:C/A:C) | Oct 10, 2017 | Oct 10, 2017 | Sep 5, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
Oct 10, 2017
Added
Oct 10, 2017
Modified
Sep 5, 2025
Description
The Microsoft Windows Domain Name System (DNS) DNSAPI.dll on Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows a remote code execution vulnerability when it fails to properly handle DNS responses, aka "Windows DNSAPI Remote Code Execution Vulnerability".
Solutions
microsoft-windows-windows_10-1507-kb4042895microsoft-windows-windows_10-1511-kb4041689microsoft-windows-windows_10-1607-kb4041691microsoft-windows-windows_10-1703-kb4041676microsoft-windows-windows_server_2012-kb4041679microsoft-windows-windows_server_2012_r2-kb4041687microsoft-windows-windows_server_2016-1607-kb4041691msft-kb4041679-4aa7d02c-1328-4f53-b136-faf79e2475c8msft-kb4041679-72b1b537-615d-4b25-b7e7-34350dcd0aabmsft-kb4041687-092e7af4-3dd9-4daf-b99f-27b776380751msft-kb4041687-92b0c4d3-a90b-4879-ba50-5542e1183baf
References
- BID-101166
- CVE-2017-11779
- https://attackerkb.com/topics/CVE-2017-11779
- URL-https://support.microsoft.com/help/4041676
- URL-https://support.microsoft.com/help/4041679
- URL-https://support.microsoft.com/help/4041687
- URL-https://support.microsoft.com/help/4041689
- URL-https://support.microsoft.com/help/4041691
- URL-https://support.microsoft.com/help/4042895
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.