Published on: 15 July 2020
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20200714/security-update-deployment-information-july-14-2020
The July 2020 security updates released by Microsoft addressed a vulnerability (CVE-2020-1350) in Microsoft DNS server. The vulnerability affects all Windows Server since Windows Server 2008. Successful exploitation of the vulnerability could allow an unauthenticated attacker to execute arbitrary code in the context of the Local System Account on a targeted Windows Server. Users are advised to apply the latest security update on the affected systems immediately to mitigate the elevated risk of cyber attacks.
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, elevation of privilege, tampering, denial of service, information disclosure and spoofing.
Patches for affected products are available from the Windows Update / Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
Microsoft also provides a registry-based workaround to limit the length of the DNS response from the upstream server to 65280 bytes. Details of the workaround could be found at the following URL:
https://support.microsoft.com/en-us/help/4569509/windows-dns-server-remote-code-execution-vulnerability
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Jul
https://www.hkcert.org/my_url/en/alert/20071501
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/microsoft-releases-july-2020-security-updates
https://us-cert.cisa.gov/ncas/current-activity/2020/07/14/microsoft-addresses-wormable-rce-vulnerability-windows-dns-server
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200008
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1025
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1032
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1040 (to CVE-2020-1043)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1085
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1240
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1249
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1267
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1326
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1330
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1333
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1336
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1342
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1344
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1346
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1347
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1349 (to CVE-2020-1375)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1384 (to CVE-2020-1416)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1418 (to CVE-2020-1424)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1426 (to CVE-2020-1439)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1442 (to CVE-2020-1451)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1454
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1456
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1458
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1461 (to CVE-2020-1463)
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1465
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1468
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1469
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1481