Technology

Microsoft fixes bug in Windows Server that lasted 17 years.

Microsoft customers can now get a repair for a 17-year-old bug that’s existed within the firm’s software program.

The bug, which was tracked as CVE-2020-1350, was patched out of Microsoft Windows Server on 14 July.

The bug was rated 10 out of 10 on CVSS vulnerability scoring system.

“A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account. Windows servers that are configured as DNS servers are at risk from this vulnerability” Microsoft’s notice.

“To exploit the vulnerability, an unauthenticated attacker could send malicious requests to a Windows DNS server.”

DNS stands for Area Identify System, which interprets IP addresses into URLs and is the equal of the telephone e book of the web.

Home windows DNS is among the hottest sorts of DNS software program.

It impacts all Home windows Server variations, from 2003 to 2019, and had the potential to unfold by way of malware with out person interplay.

This might have given hackers the power to realize entry to 1 machine and use it to entry others, much like the Wannacry bug, which was rated an 8.5 on the CVSS scale.

If a hacker could get access to the local network, via WiFi or an ethernet cable, they might set off a server takeover.