Overview
The Microsoft Windows DNS Server is vulnerable to cache poisoning, which may allow a remote, unauthenticated attacker to cause a Windows DNS server to provide incorrect responses to DNS queries.
Description
Microsoft Windows DNS Server is a service that provides DNS serving capabilities for Windows 2000 server and Windows Server 2003. For a DNS server to trust a reply to a DNS request, the reply must contain the correct client source port and address as well as an identifier known as the transaction ID. Windows DNS server uses a predictable transaction ID generator, which can allow DNS cache poisoning. |
Impact
A remote, unauthenticated attacker may be able to poison the cache of a Windows DNS server. This can cause client machines that use the DNS server to be redirected to malicious domains as the result of an incorrect DNS response. |
Solution
Apply an update This issue is addressed in Microsoft Security Bulletin MS07-062. |
Vendor Information
CVSS Metrics
| Group | Score | Vector |
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental |
References
Acknowledgements
This vulnerability was reported by Microsoft, who in turn credit Alla Berzroutchko of Scanit and Amit Klein of Trusteer.
This document was written by Will Dormann.
Other Information
| CVE IDs: | CVE-2007-3898 |
| Severity Metric: | 4.39 |
| Date Public: | 2007-11-13 |
| Date First Published: | 2007-11-13 |
| Date Last Updated: | 2007-11-13 19:32 UTC |
| Document Revision: | 5 |