Vulnerability Note VU#109475

Microsoft Windows NT and 2000 Domain Name Servers allow non-authoritative RRs to be cached by default

Original Release date: 09 Aug 2001 | Last revised: 06 Aug 2002


Microsoft Domain Name Servers hosted on Windows NT or Windows 2000 Server systems run with permissive DNS cache defaults. This may allow unauthorized remote intruders to redirect sites that rely on the vulnerable DNS servers for legitimate information.


The Domain Name System, (partially specified in RFC 1034, Domain Names - Concepts and Facilities,) is the network infrastructure which maps Internet addresses to human-readable labels (names), and vice-versa. Several implementations of the servers responsible for managing this mapping information have had a specific security vulnerability called "cache poisoning" which may lead to corruption of the DNS information (resource records, or RRs) being managed (see CA-1999-22 for more details).

Cache poisoning occurs when malicious or misleading data received from a remote name server is saved (cached) by a gullible name server. This bad data is then made available to programs running on workstations that request the cached data through the client interface (resolver). (Sample programs needing such DNS information include web browsers and email servers). This can adversely affect the mapping between host names and IP addresses, among other things. Once this mapping has been changed, hosts looking for legitimate DNS responses from a corrupted server can be redirected to arbitrary sites.

The default configuration vulnerability discussed here occurs when cache pollution protection is disabled as a default option in Windows NT and Windows 2000 servers. Windows Server systems installed with DNS ship with the "Secure cache against pollution" option disabled, allowing DNS cache poisoning to occur either by accident or design. This option represents the value of a specific registry key. If the value SecureResponses is not set to "1" in this key, then cache poisoning can occur. When in this state, the vulnerable DNS server will cache any records in a response received from a remote DNS server, even if those records are outside the namespace delegated to the remote DNS server.

It is important to note that this cache poisoning can occur without an attacker needing to predict DNS query ids (as assumed in CVE-1999-0024). Maliciously-registered glue records distributed by global top-level domain servers (gTLDs) may be utilized when attacking specific sites vulnerable to this weak configuration option.


Once the cache poisoning occurs, hosts looking for legitimate DNS responses from a corrupted server can be redirected to arbitrary sites. Alternatively, the information returned can be garbage, leading to possible denial of DNS service.


On affected Windows NT or 2000 systems, locate the following key in the registry:


On the Edit menu, click Add Value, and then add the following registry value:

     Value Name: SecureResponses
     Data Type: REG_DWORD
     Value: 1

On Windows 2000 Server systems, there is a GUI option "Secure cache against pollution" in the DNS Management Console which can set the registry key value automatically. Please see the Knowledge Base article Q241352 for step-by-step instructions.

(Note that even given the stronger configuration, other forms of attack involving DNS cache poisoning are possible. This class of problem likely cannot be completely resolved until there is widely-deployed cryptographicly-secure authentication available for DNS. See the IETF dnsext Working Group for more information on this topic.)

See Q241352 for the complete set of instructions for enabling cache protection for both Windows NT and Windows 2000 Server systems.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected23 Jul 200114 Sep 2001
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



The details of this issue have been discussed in several public forums:

  • SANS

Microsoft has several articles in its knowledgebase as well.

This document was written by Jeffrey S. Havrilla.

Other Information

  • CVE IDs: Unknown
  • Date Public: 22 Jun 2001
  • Date First Published: 09 Aug 2001
  • Date Last Updated: 06 Aug 2002
  • Severity Metric: 11.55
  • Document Revision: 62


If you have feedback, comments, or additional information about this vulnerability, please send us email.