You are currently offline, waiting for your internet to reconnect

Microsoft Security Advisory: A vulnerability in RPC in the Windows DNS Server service could allow remote code execution

Support for Windows Server 2003 ended on July 14, 2015

Microsoft ended support for Windows Server 2003 on July 14, 2015. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

This article has been archived. It is offered "as is" and will no longer be updated.
A vulnerability has been discovered in the Domain Name System (DNS) Server service in Microsoft Windows 2000 Server Service Pack 4 (SP4), in Microsoft Windows Server 2003 Service Pack 1 (SP1), and in Windows Server 2003 Service Pack 2 (SP2). Windows 2000 Professional SP4, Microsoft Windows XP SP2, and Windows Vista are not affected because these versions of Windows do not contain the vulnerable code. Microsoft has released a Microsoft Security Advisory about this issue for IT professionals. This security advisory also contains additional security-related information. To view this security advisory, visit the following Microsoft Web site:

Article ID: 935964 - Last Review: 01/15/2015 08:46:04 - Revision: 3.0

Microsoft Windows Server 2003 Service Pack 1, Microsoft Windows Server 2003 Service Pack 2

  • kbnosurvey kbarchive kbsecadvisory kbtshoot kbexpertiseinter kbsecurity kbsecvulnerability KB935964