* Microsoft Vulnerability in RPC on Windows DNS Server
As a follow up to our diary earlier this week about a potential new DNS Vulnerability, Microsoft has released an advisory in regard to the vulnerability. Microsoft has investigated and it appears a vulnerability exists that could allow an attacker to run code under the Domain Name System Server service. This service by default runs as the local SYSTEM id.
Microsoft has a few suggested actions that can mitigate the risk with the caveat that some tools may break.
---
Scott Fendley
ISC Handler
Microsoft has a few suggested actions that can mitigate the risk with the caveat that some tools may break.
- Disable remote management over RPC for the DNS server via a registry key setting.
- Block unsolicited inbound traffic on ports 1024-5000 using IPsec or other firewall.
- Enable the advanced TCP/IP Filtering options on the appropriate interfaces of the server.
---
Scott Fendley
ISC Handler
Keywords:
0 comment(s)
×
Diary Archives
Comments