Hackers feast on Microsoft DNS server vulnerability

COMMENT ON THIS ARTICLE

Attackers are trying to take advantage of a newly-disclosed vulnerability in several of Microsoft Corp.’s server products that could allow them to run unauthorized code on affected computers, the company has warned.

The attacks are limited so far, according to a Microsoft advisory issued late Thursday evening. The company is working on a patch but no release date has been set, a spokeswoman in London said.

Microsoft just issued seven critical patches on Tuesday, its monthly patch day, and isn’t due for another round until May 8. The company did issue an emergency patch on April 3 for a dangerous animated cursor flaw, but it does not typically stray from its regular patch schedule.

The vulnerability lies in the in the DNS (domain name system) Server Service, which looks up numerical IP (Internet protocol) addresses to allow a Web site to be called into a browser. The affected products are Windows 2000 Server Service Pack 4, and Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2.

The flaw can cause a stack-based buffer overrun in the DNS Server’s RPC (remote procedure call) interface. RPC is a protocol through which a program can request a service from an application on another machine on a network.

An attacker could try to exploit the problem by sending a special RPC packet to the system, which then could allow code to run in the “security context of the Domain Name System Server Service,” Microsoft said.

Microsoft listed several ways to block an attack until a patch is issued. Administrators can disable RPC’s remote management capability through the registry key settings, Microsoft said. The SANS Institute, which monitors the health of the Internet and conducts security training, recommended this option.

Other workarounds include blocking ports 1024 to 5000 on the firewall, which are used by the RPC protocol, and enabling advanced TCP/IP filtering, Microsoft said.

Danish security vendor Secunia AsP rated the problem as “highly critical” in an advisory.

COMMENT ON THIS ARTICLE

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now