Short Name |
MS-RPC:OF:MS-DNS-RPC |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
MS-RPC |
Keywords |
Microsoft DNS RPC Service Buffer Overflow |
Release Date |
2009/10/26 |
Update Number |
1532 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a vulnerability in Microsoft's DNS Server. A stack based buffer overflow is present in the Remote Procedure Call (RPC) Interface that allows an attacker to execute code in the context of SYSTEM.
Microsoft Windows Domain Name System (DNS) Server Service is prone to a stack-based buffer-overflow vulnerability in its Remote Procedure Call (RPC) interface. A remote attacker may exploit this issue to run arbitrary code in the context of the DNS Server Service. The DNS service runs in the 'SYSTEM' context. Successfully exploiting this issue allows attackers to execute arbitrary code, facilitating the remote compromise of affected computers. Windows Server 2000 Service Pack 4, Windows Server 2003 Service Pack 1, and Windows Server 2003 Service Pack 2 are confirmed vulnerable to this issue. Microsoft Windows 2000 Professional SP4, Windows XP SP2, and Windows Vista are not affected by this vulnerability.