Security

Microsoft Windows DNS Service Two Vulnerabilities

Description

Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

1) A sign-extension error in the Windows DNS server when processing a query for a NAPTR (Name Authority Pointer) resource record can be exploited to cause a heap-based buffer overflow.

Successful exploitation may allow execution of arbitrary code, but requires that the server is setup e.g. as a caching or relay DNS server.

2) An error within the Windows DNS server when processing a query for a non-existent domain can be exploited to cause the server to stop responding.

Solution

Apply patches.

Provided and/or discovered by
1) The vendor credits Grischa Zengel, Zengel Medizintechnik
2) Reported by the vendor

Original Advisory
MS11-058 (KB2562485):
http://www.microsoft.com/technet/security/Bulletin/MS11-058.mspx

Source:
http://secunia.com/advisories/45552/

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s