If you run DNS on Microsoft Windows, pay careful attention to the MS-15-127 patch.
Microsoft rates this patch as critical for most Windows platforms running DNS services.
Remote exploits are possible, including remote code execution. Attackers exploiting this issue could obtain Local System context and privileges.
We are currently aware that reverse engineering of the patch has begun by researchers and exploit development is under way in the underground pertaining to this issue. A working exploit is likely to be made available soon, if it is not already in play, as you read this.
Got MS DNS Servers? Get the Patch ASAP! MicroSolved, Inc. #infosec https://t.co/Guzyiusxmy
Running Microsoft DNS? Make sure you install their latest update ASAP. Need more info? Check out: https://t.co/n1oqFO0EBz CC: @MicroSolved
New Blog Post: Got MS DNS Servers? Get the Patch ASAP! https://t.co/KGK5dzUrmk
RT @lbhuston: New Blog Post: Got MS DNS Servers? Get the Patch ASAP! https://t.co/KGK5dzUrmk
Got MS DNS Servers? Get the Patch ASAP! https://t.co/wOUU1wh5oY #infosec #DNS #protectDNS
Got MS DNS Servers? Get the Patch ASAP! – If you run DNS on Microsoft Windows, pay careful attention to the MS-… https://t.co/QSI0TVO06F
Got MS DNS Servers? Get the Patch ASAP! – MSI :: State of SecurityMSI ::… https://t.co/oiKYLTFi9G
Got MS DNS Servers? Get the Patch ASAP! – MSI :: State of SecurityMSI :: State of Security #infosec #DNS #patch https://t.co/vi6L1aXnnS