Executive Summary

Summary
Title Vulnerability in DNS Could Allow Spoofing (941672)
Informations
NameMS07-062First vendor Publication2007-11-13
VendorMicrosoftLast vendor Modification2007-11-13
Severity (Vendor) ImportantRevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:P)
Cvss Base Score6.4Attack RangeNetwork
Cvss Impact Score4.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

This important security update resolves a privately reported vulnerability. This spoofing vulnerability exists in Windows DNS Servers and could allow an attacker to send specially crafted responses to DNS requests, thereby spoofing or redirecting Internet traffic from legitimate locations.

Original Source

Url : http://www.microsoft.com/technet/security/bulletin/ms07-062.mspx

CWE : Common Weakness Enumeration

idName
CWE-16Configuration

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:4395
 
Oval ID: oval:org.mitre.oval:def:4395
Title: Vulnerability in DNS Could Allow Spoofing
Description: The DNS server in Microsoft Windows 2000 Server SP4, and Server 2003 SP1 and SP2, uses predictable transaction IDs when querying other DNS servers, which allows remote attackers to spoof DNS replies, poison the DNS cache, and facilitate further attack vectors.
Family: windows Class: vulnerability
Reference(s): CVE-2007-3898
Version: 3
Platform(s): Microsoft Windows 2000
Microsoft Windows Server 2003
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os20
Os19

OpenVAS Exploits

DateDescription
2009-03-05Name : Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
File : nvt/secpod_ms_dns_mem_corr_vuln.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
41092Microsoft Windows DNS Service Predictable Transaction ID Weakness

Snort® IPS/IDS

DateDescription
2014-01-10Microsoft Windows DNS server spoofing attempt
RuleID : 16206 - Revision : 7 - Type : OS-WINDOWS
2014-01-10dns cache poisoning attempt
RuleID : 13667 - Revision : 17 - Type : PROTOCOL-DNS

Nessus® Vulnerability Scanner

DateDescription
2014-03-05Name : The DNS server running on the remote host is vulnerable to DNS spoofing attacks.
File : ms_dns_kb941672.nasl - Type : ACT_GATHER_INFO
2007-11-13Name : Remote DNS server is vulnerable to spoofing attacks.
File : smb_nt_ms07-062.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2014-03-06 13:21:27
  • Multiple Updates
2014-02-17 11:45:48
  • Multiple Updates
2014-01-19 21:30:08
  • Multiple Updates
2013-05-11 12:22:04
  • Multiple Updates