Question about KB4569509: Guidance for DNS Server Vulnerability CVE-2020-1350 RRS feed

  • Question

  • The article shows a workaround to protect unpatched systems against the SIGRed vulnerability using a registy entry

    Subkey: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters 
    Value: TcpReceivePacketSize 
    Type: DWORD 
    Value data: 0xFF00

    Now my question is: are there any minimum requirements (min. patch level, i.e. January 2020 updates, etc.) for Windows Server 2008 R2, or does this workaround works on every 2008 R2 SP1 (before the ESU program started) ?

    The KB is very unclear about these min. requirements, just mentioning 2008 R2 SP1.

    Monday, July 20, 2020 6:04 PM

All replies