Windows NT DNS denial of service attack

Risk Level: Medium risk vulnerability  Medium

Check or Attack Name: ntdnsdos

Platforms: Windows NT, DNS
Description:

The DNS server that ships with Windows NT 4.0 is vulnerable to a number of denial of service attacks.

Remedy:

Update your DNS server. See Microsoft's FTP site for details at ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/.

References:

Fyodor's Exploit World, Another way to crash NT DNS server, http://www.insecure.org/sploits/NT.DNS.character_flood.html

Microsoft Knowledge Base Article Q169461, Access Violation in DNS.EXE Caused by Malicious Telnet Attack, http://support.microsoft.com/support/kb/articles/Q169/4/61.asp

Microsoft Knowledge Base Article Q142047, Bad Network Packet May Cause Access Violation (AV) on DNS Server, http://support.microsoft.com/support/kb/articles/Q142/0/47.asp

Microsoft Knowledge Base Article Q154984, DNS Server May Not Recursively Resolve Some Names, http://support.microsoft.com/support/kb/articles/Q154/9/84.asp

Microsoft Knowledge Base Article Q154985, DNS Registry Key Not Updated When Changing Zone Type, http://support.microsoft.com/support/kb/articles/Q154/9/85.asp

Microsoft Knowledge Base Article Q167629, Predictable Query IDs Pose Security Risks for DNS Servers, http://support.microsoft.com/support/kb/articles/Q167/6/29.asp

, ,


X-Force Logo
Know Your Risks