{"@odata.context":"https://api.msrc.microsoft.com/sug/v2.0/en-US/$metadata#vulnerability/$entity","id":"00000000-0000-0000-0000-000000d17514","releaseDate":"2021-07-13T07:00:00Z","cveNumber":"CVE-2021-34442","cveTitle":"Windows DNS Server Remote Code Execution Vulnerability","releaseNumber":"2021-Jul","vulnType":"Security Vulnerability","latestRevisionDate":"2021-09-14T07:00:00Z","cweList":[],"mitreText":"CVE-2021-34442","mitreUrl":"https://www.cve.org/CVERecord?id=CVE-2021-34442","publiclyDisclosed":"No","exploited":"No","latestSoftwareReleaseId":2,"latestSoftwareRelease":"Exploitation Less Likely","olderSoftwareReleaseId":2,"olderSoftwareRelease":"Exploitation Less Likely","denialOfService":"N/A","tag":"Role: DNS Server","issuingCna":"Microsoft","severityId":100000001,"severity":"Important","impactId":100000005,"impact":"Remote Code Execution","langCode":"en-US","baseScore":"8.8","temporalScore":"7.7","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","isMariner":false,"articles":[{"articleType":"FAQ","description":"
If my server is not configured to be a DNS server, it is vulnerable?
\nNo, this vulnerability is only exploitable if the server is configured to be a DNS server.
\n","ordinal":10000}],"revisions":[{"cveNumber":"CVE-2021-34442","version":1.0,"revisionDate":"2021-07-13T07:00:00Z","initialDate":"0001-01-01T00:00:00Z","description":"Information published.
\n","unformattedDescription":"Information published.","notificationNeeded":false,"notificationSent":false,"sourceId":"5adba9a5-77c9-eb11-a83f-000d3a6d3364"},{"cveNumber":"CVE-2021-34442","version":1.1,"revisionDate":"2021-09-14T07:00:00Z","initialDate":"0001-01-01T00:00:00Z","description":"The following revisions have been made: 1) In the Security Updates table, corrected the impact entries to Remote Code Execution. 2) The CVSS scores have been updated. These are informational changes only. Customers who have successfully installed the update do not need to take any further action.
\n","unformattedDescription":"The following revisions have been made: 1) In the Security Updates table, corrected the impact entries to Remote Code Execution. 2) The CVSS scores have been updated. These are informational changes only. Customers who have successfully installed the update do not need to take any further action.","notificationNeeded":false,"notificationSent":false,"sourceId":"9cccf823-f614-ec11-a84a-000d3a6d3364"}]}