Vulnerability Note VU#484649

Microsoft Windows DNS Server vulnerable to cache poisoning

Original Release date: 13 Nov 2007 | Last revised: 13 Nov 2007


The Microsoft Windows DNS Server is vulnerable to cache poisoning, which may allow a remote, unauthenticated attacker to cause a Windows DNS server to provide incorrect responses to DNS queries.


Microsoft Windows DNS Server is a service that provides DNS serving capabilities for Windows 2000 server and Windows Server 2003. For a DNS server to trust a reply to a DNS request, the reply must contain the correct client source port and address as well as an identifier known as the transaction ID. Windows DNS server uses a predictable transaction ID generator, which can allow DNS cache poisoning.


A remote, unauthenticated attacker may be able to poison the cache of a Windows DNS server. This can cause client machines that use the DNS server to be redirected to malicious domains as the result of an incorrect DNS response.


Apply an update

This issue is addressed in Microsoft Security Bulletin MS07-062.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Microsoft CorporationAffected-13 Nov 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



This vulnerability was reported by Microsoft, who in turn credit Alla Berzroutchko of Scanit and Amit Klein of Trusteer.

This document was written by Will Dormann.

Other Information

  • CVE IDs: CVE-2007-3898
  • Date Public: 13 Nov 2007
  • Date First Published: 13 Nov 2007
  • Date Last Updated: 13 Nov 2007
  • Severity Metric: 4.39
  • Document Revision: 3


If you have feedback, comments, or additional information about this vulnerability, please send us email.