Vulnerability Note VU#484649
Microsoft Windows DNS Server vulnerable to cache poisoning
The Microsoft Windows DNS Server is vulnerable to cache poisoning, which may allow a remote, unauthenticated attacker to cause a Windows DNS server to provide incorrect responses to DNS queries.
Microsoft Windows DNS Server is a service that provides DNS serving capabilities for Windows 2000 server and Windows Server 2003. For a DNS server to trust a reply to a DNS request, the reply must contain the correct client source port and address as well as an identifier known as the transaction ID. Windows DNS server uses a predictable transaction ID generator, which can allow DNS cache poisoning.
A remote, unauthenticated attacker may be able to poison the cache of a Windows DNS server. This can cause client machines that use the DNS server to be redirected to malicious domains as the result of an incorrect DNS response.
Apply an update
This issue is addressed in Microsoft Security Bulletin MS07-062.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||13 Nov 2007|
CVSS Metrics (Learn More)
This vulnerability was reported by Microsoft, who in turn credit Alla Berzroutchko of Scanit and Amit Klein of Trusteer.
This document was written by Will Dormann.
- CVE IDs: CVE-2007-3898
- Date Public: 13 Nov 2007
- Date First Published: 13 Nov 2007
- Date Last Updated: 13 Nov 2007
- Severity Metric: 4.39
- Document Revision: 3
If you have feedback, comments, or additional information about this vulnerability, please send us email.