Another quality video from ThioJoe. Good explanation of what a buffer overflow is. This problem is also called a "segmentation fault."
@joetheoriginalclark4 жыл бұрын
Thank you for posting about this. I have a Plex server at my house and even though this doesn't seem likely to effect me it's nice to be sure. I have server 2016 and the main reason I'm using a server OS is because I have server hardware it's not for the features.
@BattousaiHBr4 жыл бұрын
it could affect you if the DNS server you're using is running windows server. but there's probably no way for you to know, nor fix it since it's not your responsibility. in doubt, just use one of the major public DNS providers like cloudflare or google.
@user-vn7ce5ig1z4 жыл бұрын
They didn't mention it, but it's potentially possible that _every_ version of Windows, server or not, all the way back to at least Windows 2000 (and maybe even 9x 🤔) is vulnerable if the buggy code is also present in the Windows DNS Cache service. All the more reason to disable the DNS Cache service and use a different DNS server like Unbound or Deadwood or BIND.
@Rylan-Brandt4 жыл бұрын
Thank you for putting this out there
@sakiafrfr4 жыл бұрын
U need more subs on this channel Joe!
@DragoniteSpam4 жыл бұрын
If anyone wants another fun explanation of a buffer overflow, look up xkcd's Heartbleed Explanation and imagine the process going in reverse.
@not11ask4 жыл бұрын
Poor Sigrid 😂
@danielandrews6574 жыл бұрын
a gigabyte of ram should do the trick
@zeusdeegoose74974 жыл бұрын
Is there a CVSS website? I couldn't find any.
@mattp124 жыл бұрын
I mean technicallyyy you create exploits based on vulnerabilities and you don’t find them 😎
@BattousaiHBr4 жыл бұрын
is this vulnerability valid in india?
@abdelhamidnaceri94314 жыл бұрын
@HiIamFin lmao
@fishgaming85994 жыл бұрын
Sup joe
@droy3334 жыл бұрын
Your video is reading websites. None of which explain how the vulnerability works in the real world. As I understand it, a domain authenticated computer receives a DNS request (and payload) from an exploited website which is passed to the Windows DNS server which most likely causes a buffer overflow and crash. Having it run code while possible is probably unlikely depending on the intentions. Who would bother with this vulnerability? Someone with a specific target. By the time the usual scumbags could work out how to exploit this for financial gain most Windows PC's would be up to date.
@itskdog4 жыл бұрын
Servers don't get updated as often as client PCs, as a server restarting means downtime for the business (no access to networked printers, network shares (including users' personal drives), and even the internet, depending on the setup in the network), and so there's the need to schedule maintenance, and different organisations have different rules as to how much advance warning is needed for maintenance downtime (which can take a long time, as, at least from my experience, installing the updates takes a lot longer than on client machines). I work in a school, and if we need to have urgent downtime outside of school holidays, we have to check for a Saturday that the school is open for outside orgs hiring the building, and then one of us comes in then to do the maintenance then. (You don't really want to be doing a server reboot remotely, unless it's a VM, and even then, it's better to do it from the host machine if you can)
@DivinePudding1334 жыл бұрын
Hi ThioMcThio
@6bim4uYGfeGSM4jdEm9g24 жыл бұрын
macOS
@hughw.4 жыл бұрын
Can I find you on Tik Tok :)
@jeanmarshall33694 жыл бұрын
HERE
@slavko56664 жыл бұрын
Linux are better servers anyway
@itskdog4 жыл бұрын
Sadly Samba isn't as good as the real AD, and so Windows Server will continue for a while yet.
@anaveragetoast4 жыл бұрын
This is why I turn off all settings in Windows that could spy on me