Thursday, June 27, 2019
  • Home
  •             

Server DNS vulnerability attacks

April 14th, 2007 by Patrick S

Microsoft confirmed yesterday that it has uncovered targeted attacks exploiting a new vulnerability in the Windows Server DNS Service.

Microsoft immediately mobilised its Software Security Incident Response Process (SSIRP) to investigate.

Due to a stack-based buffer overrun that exists in the Windows DNS Server’s remote procedure call (RPC) interface, attackers can send an RPC packet to the interface enabling them to run malicious code on the system. This vulnerability could allow a criminal to run code in the security context of the Domain Name System Server Service in Microsoft Windows 2000 Server Service Pack 4, Windows Server 2003 Service Pack 1, and Windows Server 2003 Service Pack 2, which by default runs as Local SYSTEM.

Users are encouraged to follow its “Protect Your PC” guidance of enabling a firewall, applying all security updates and installing anti-virus and spyware software to help minimise the possibility of a successful attack.

Microsoft is also urging customers to disable remote management over RPC capability for DNS Servers through the registry key setting, as well as block unsolicited inbound traffic on ports between 1024 and 5000 and enable advanced TCP/IP filtering, which will act as a workaround and stop attackers exploiting this vulnerability.

Details and workarounds can be found in Microsoft’s Technet Security Advisory 935964.

Source vnunet.com

Posted in Security, Windows Server System | Comments Off on Server DNS vulnerability attacks


This entry was posted on Saturday, April 14th, 2007 at 3:42 pm and is filed under Security, Windows Server System. You can follow any responses to this entry through the RSS 2.0 feed. Both comments and pings are currently closed.


Comments are closed.