Overview
The Microsoft Windows DNS Server is vulnerable to cache poisoning, which may allow a remote, unauthenticated attacker to cause a Windows DNS server to provide incorrect responses to DNS queries.
Description
Microsoft Windows DNS Server is a service that provides DNS serving capabilities for Windows 2000 server and Windows Server 2003. For a DNS server to trust a reply to a DNS request, the reply must contain the correct client source port and address as well as an identifier known as the transaction ID. Windows DNS server uses a predictable transaction ID generator, which can allow DNS cache poisoning. |
Impact
A remote, unauthenticated attacker may be able to poison the cache of a Windows DNS server. This can cause client machines that use the DNS server to be redirected to malicious domains as the result of an incorrect DNS response. |
Solution
Apply an update This issue is addressed in Microsoft Security Bulletin MS07-062. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by Microsoft, who in turn credit Alla Berzroutchko of Scanit and Amit Klein of Trusteer.
This document was written by Will Dormann.
Other Information
CVE IDs: | CVE-2007-3898 |
Severity Metric: | 4.39 |
Date Public: | 2007-11-13 |
Date First Published: | 2007-11-13 |
Date Last Updated: | 2007-11-13 19:32 UTC |
Document Revision: | 5 |