Use After Free Vulnerability in DNS Server by Microsoft
CVE-2025-24064

8.1HIGH

What is CVE-2025-24064?

CVE-2025-24064 is a vulnerability found in Microsoft's DNS Server, which is integral for translating domain names into IP addresses, thus enabling communication over networks. This flaw is categorized as a "use after free" vulnerability, allowing unauthorized attackers to execute code within the context of the DNS Server. If exploited, it could lead to significant security breaches, jeopardizing the integrity and availability of organizational IT infrastructures.

Technical Details

The CVE-2025-24064 vulnerability occurs in the memory management of the DNS Server software where memory that has been freed is still being accessed, leading to potential exploitation by attackers. This type of vulnerability is particularly dangerous as it can occur in various scenarios within the network operation processes, possibly allowing for remote code execution.

Potential impact of CVE-2025-24064

  1. Remote Code Execution: Attackers could remotely execute arbitrary code within the DNS Server, potentially gaining control over network operations.

  2. Compromise of Network Integrity: Exploitation of this vulnerability might allow attackers to manipulate DNS queries and responses, undermining the trustworthiness of domain name resolutions and enabling further attacks on users and systems.

  3. Widespread Service Disruption: By targeting the DNS Server's functionality, an attacker could disrupt normal network operations, potentially causing downtime and loss of service for an organization.

Affected Version(s)

Windows Server 2008 Service Pack 2 x64-based Systems 6.0.6003.0 < 6.0.6003.23168

Windows Server 2008 R2 Service Pack 1 (Server Core installation) x64-based Systems 6.1.7601.0 < 6.1.7601.27618

Windows Server 2008 R2 Service Pack 1 x64-based Systems 6.1.7601.0 < 6.1.7601.27618

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.