* Microsoft Vulnerability in RPC on Windows DNS Server
As a follow up to our diary earlier this week about a potential new DNS Vulnerability,  Microsoft has released an advisory in regard to the vulnerability.  Microsoft has investigated and it appears a vulnerability exists that could allow an attacker to run code under the Domain Name System Server service.  This service by default runs as the local SYSTEM id.  
Microsoft has a few suggested actions that can mitigate the risk with the caveat that some tools may break.
---
Scott Fendley
ISC Handler
Microsoft has a few suggested actions that can mitigate the risk with the caveat that some tools may break.
- Disable remote management over RPC for the DNS server via a registry key setting.
- Block unsolicited inbound traffic on ports 1024-5000 using IPsec or other firewall.
- Enable the advanced TCP/IP Filtering options on the appropriate interfaces of the server.
---
Scott Fendley
ISC Handler
Keywords: 
0 comment(s)
  
  ×
  
  ![modal content]() 
  
  
Diary Archives
         
              
Comments