Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2020-1038: Windows Routing Utilities Denial of Service

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2020-1038: Windows Routing Utilities Denial of Service

Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
09/08/2020
Created
09/09/2020
Added
09/08/2020
Modified
09/11/2024

Description

A denial of service vulnerability exists when Windows Routing Utilities improperly handles objects in memory, aka 'Windows Routing Utilities Denial of Service'.

Solution(s)

  • microsoft-windows-windows_10-1507-kb4577049
  • microsoft-windows-windows_10-1607-kb4577015
  • microsoft-windows-windows_10-1709-kb4577041
  • microsoft-windows-windows_10-1803-kb4577032
  • microsoft-windows-windows_10-1809-kb4570333
  • microsoft-windows-windows_10-1903-kb4574727
  • microsoft-windows-windows_10-1909-kb4574727
  • microsoft-windows-windows_10-2004-kb4571756
  • microsoft-windows-windows_server_2012-kb4577048
  • microsoft-windows-windows_server_2012_r2-kb4577071
  • microsoft-windows-windows_server_2016-1607-kb4577015
  • microsoft-windows-windows_server_2019-1809-kb4570333
  • msft-kb4571756-5b919d47-fce4-48a0-8d72-b3fc27b78f6e
  • msft-kb4574727-0eef97a6-edd8-47e9-b6c7-d2f66afcc6a1
  • msft-kb4574727-48c91ab8-33a2-4dc3-96b2-9d75dc6c1f78
  • msft-kb4577048-2a6f610f-3d94-44f9-9494-dff5d7dc4c7d
  • msft-kb4577048-8b77cb70-27e9-4194-8f41-961ff9f368e3
  • msft-kb4577053-12c49102-1b38-42a7-8c2a-9d72e0144a4d
  • msft-kb4577053-2cb12d27-8402-4b36-b44e-6496985fe4bb
  • msft-kb4577053-2fd523e1-6405-49f3-969f-cf7b165622ec
  • msft-kb4577053-8d0ba4d5-cad5-40be-b7a6-217507cba489
  • msft-kb4577053-ec5db2e3-9ef0-4898-b29d-f06265c1bd45
  • msft-kb4577070-09dac0b6-2b41-4365-b493-1f9100614a59
  • msft-kb4577070-f641b947-d0d7-449a-8152-9de3a3ff376b
  • msft-kb4577071-3ff40370-a545-4963-ac68-b4514134ae04
  • msft-kb4577071-4e5fb1e0-c9ea-4e9c-bf38-01f1f39da91f

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;