CIS CYBER SECURITY ADVISORIES
MS-ISAC CYBER SECURITY ADVISORY NUMBER:
Vulnerabilities in DNS Server Could Allow Remote Code Execution (MS11-058) - RISK: HIGH
Two new vulnerabilities have been discovered in Windows DNS Server. The Domain Name System (DNS) is used to translate IP addresses into human-readable domain names. Microsoft includestheir implementation of DNS with their Windows Server operating systems. Both vulnerabilities can be exploited by sending a specially crafted DNS query to the affected system. Successful exploitation of the first vulnerability could result in an attacker gaining complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Successful exploitation of the second vulnerability could result in a denial-of-service condition.
- Microsoft Windows Server 2003
- Microsoft Windows Server 2008
- Large and medium government entities: High
- Small government entities: High
- Large and medium business entities: High
- Small business entities: High
Home users: Low
Two vulnerabilities have been discovered in Windows DNS Server that could allow for remote code execution or denial of service conditions.
DNS NAPTR Query Vulnerability
A vulnerability has been discovered in the way Windows DNS Server handles NAPTR DNS queries in memory. Domain Name System records associate the IP address of a particular host with a human-readabledomain name. Naming Authority Pointer (NAPTR) DNS records allow DNS to be used for a variety of additional resource types, including those that do not adhere to a domain name syntax.
In order to successfully exploit this vulnerability, an attacker would need to first identify a vulnerable Windows DNS server. The attacker then crafts a NAPTR query designed to exploit the issue and sends the query to the server. Once received, the non-authoritative DNS server will hold the query in memory while it attempts to retrieve the record from an authoritative DNS server. Windows DNS Server fails to properly manage the query in memory while performing this lookup, which could result in a successful compromise. Successful exploitation of the vulnerability couldresult in an attacker gaining complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
DNS Uninitialized Memory Corruption Vulnerability
A vulnerability has been discovered in the way Windows DNS Server handles an uninitialized memory object while searching for the resource record of a non-existent domain. An attacker can exploit this vulnerability by sending a specially crafted DNS query for a non-existent domain to a vulnerable Windows DNS server. Successful exploitation of this vulnerability could result in a denial-of-service condition.
We recommend the following actions be taken:
- Apply appropriate patches provided by Microsoft to vulnerable systems immediately after appropriate testing.