Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2019-0941: Microsoft IIS Server Denial of Service Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2019-0941: Microsoft IIS Server Denial of Service Vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
06/11/2019
Created
06/12/2019
Added
06/11/2019
Modified
09/11/2024

Description

A denial of service exists in Microsoft IIS Server when the optional request filtering feature improperly handles requests, aka 'Microsoft IIS Server Denial of Service Vulnerability'.

Solution(s)

  • microsoft-windows-windows_10-1507-kb4503291
  • microsoft-windows-windows_10-1607-kb4503267
  • microsoft-windows-windows_10-1703-kb4503279
  • microsoft-windows-windows_10-1709-kb4503284
  • microsoft-windows-windows_10-1803-kb4503286
  • microsoft-windows-windows_10-1809-kb4503327
  • microsoft-windows-windows_10-1903-kb4503293
  • microsoft-windows-windows_server_2012-kb4503263
  • microsoft-windows-windows_server_2012_r2-kb4503290
  • microsoft-windows-windows_server_2016-1607-kb4503267
  • microsoft-windows-windows_server_2019-1809-kb4503327
  • msft-kb4503263-3f49e638-6f8c-47cd-a1cd-255c6ae917ba
  • msft-kb4503263-bce6e093-7a69-4f5b-9b2a-c4861df34e7b
  • msft-kb4503269-1cdbe639-c27c-4ac7-9343-f9bf1604f686
  • msft-kb4503269-2ab80a73-82cd-43ce-a721-9bdf2efe53cb
  • msft-kb4503269-358b582d-4bc3-413a-8b92-8bcf4353a820
  • msft-kb4503269-3c4860d8-79ae-4d88-b2ea-5514f6cff025
  • msft-kb4503269-48d42c58-c168-47e3-b5b9-fa8b78b0ae33
  • msft-kb4503269-af9ce13b-08ae-4959-9ba1-cbfb91fb4189
  • msft-kb4503287-847114ee-376d-46b7-b2cd-b00c06ebf72e
  • msft-kb4503287-a3ab06bf-f665-4dbf-9f11-3a14c721ab1b
  • msft-kb4503287-ac203890-b63c-4698-993f-b654f3a37ae6
  • msft-kb4503290-1a32764d-38ac-46c1-95fd-1bbb92147e05
  • msft-kb4503290-b489422c-7cde-4048-b72d-6ba8cfeb9ea5
  • msft-kb4503293-c6d3d33b-8eca-4003-9755-d7eb5e197ac7

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;