search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Microsoft Windows DNS Server vulnerable to cache poisoning

Vulnerability Note VU#484649

Original Release Date: 2007-11-13 | Last Revised: 2007-11-13

Overview

The Microsoft Windows DNS Server is vulnerable to cache poisoning, which may allow a remote, unauthenticated attacker to cause a Windows DNS server to provide incorrect responses to DNS queries.

Description

Microsoft Windows DNS Server is a service that provides DNS serving capabilities for Windows 2000 server and Windows Server 2003. For a DNS server to trust a reply to a DNS request, the reply must contain the correct client source port and address as well as an identifier known as the transaction ID. Windows DNS server uses a predictable transaction ID generator, which can allow DNS cache poisoning.

Impact

A remote, unauthenticated attacker may be able to poison the cache of a Windows DNS server. This can cause client machines that use the DNS server to be redirected to malicious domains as the result of an incorrect DNS response.

Solution

Apply an update

This issue is addressed in Microsoft Security Bulletin MS07-062.

Vendor Information

484649
Expand all

Microsoft Corporation

Updated:  November 13, 2007

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

This issue is addressed in Microsoft Security Bulletin MS07-062.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

This vulnerability was reported by Microsoft, who in turn credit Alla Berzroutchko of Scanit and Amit Klein of Trusteer.

This document was written by Will Dormann.

Other Information

CVE IDs: CVE-2007-3898
Severity Metric: 4.39
Date Public: 2007-11-13
Date First Published: 2007-11-13
Date Last Updated: 2007-11-13 19:32 UTC
Document Revision: 3

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.