Executive Summary
Summary | |
---|---|
Title | Update for DNS Devolution |
Informations | |||
---|---|---|---|
Name | KB971888 | First vendor Publication | 2009-06-09 |
Vendor | Microsoft | Last vendor Modification | 1970-01-01 |
Severity (Vendor) | N/A | Revision | 1.0 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : | |||
---|---|---|---|
Cvss Base Score | Not Defined | Attack Range | Not Defined |
Cvss Impact Score | Not Defined | Attack Complexity | Not Defined |
Cvss Expoit Score | Not Defined | Authentication | Not Defined |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft is announcing the availability of an update to DNS devolution that can help customers in keeping their systems protected. Customers whose domain name has three or more labels, such as "contoso.co.us", or who do not have a DNS suffix list configured, or for whom the following mitigating factors do not apply may inadvertently be allowing client systems to treat systems outside of the organizational boundary as though they were internal to the organization's boundary. Mitigating Factors:
General InformationOverviewPurpose of Advisory: To provide clarification and notification of the availability of a non-security update that may help customers in keeping their systems protected. Advisory Status: Microsoft Knowledge Base Article and associated updates were released. Recommendation: Review the referenced Knowledge base and apply the appropriate updates.
This advisory discusses the following software.
Frequently Asked QuestionsWhat is the scope of the advisory? What is a top-level domain (TLD)? What is a Primary DNS Suffix (PDS)? What is a second-level domain (SLD)? What does the DNS devolution feature do? What causes this risk? What are the implications for the queries going outside organizational boundary? All queries would expose the internal IP addresses. Network clients may exchange credentials with the malicious server. In case the query is for a WPAD server, malicious proxy may be set in the client machines. Does this update change my current DNS devolution behavior? Is there a change in user experience after this update is installed? This is a security advisory about a non-security update. Isn't that a contradiction? How is this update offered? Is this update distributed on Automatic Update? Why is this not a security update that is announced in a security bulletin? Why is this update offered in a security advisory? Suggested ActionsWorkaroundsMicrosoft has tested the following workarounds. Although these workarounds will not correct the underlying risk, they help block known attack vectors. When a workaround reduces functionality, it is identified in the following section. Disable DNS DevolutionTo disable automatic DNS devolution, save the following to a file with an .REG extension and then run regedit.exe /s <filename> from an elevated or administrative command prompt: Note Refer to the TechNet article, UseDomainNameDevolution, for more information on the UseDomainNameDevolution registry value.
For the changes to take effect, the DNS client service must be stopped and re-started. This can be accomplished from an elevated or administrative command prompt using the following command:
Impact of Workaround: The DNS resolver will not perform devolution, potentially breaking any applications or configurations that rely on this behavior. Applications that perform their own form of devolution are not affected by this setting. Configure a Domain Suffix Search ListTo create a domain suffix search list, save the following to a file with a .REG extension and then run regedit.exe /s <filename> from an elevated or administrative command prompt:
Note Windows Server 2003 includes the ability to distribute the domain suffix search list via Group Policy. For more information, see Microsoft Knowledge Base 294785 in the DNS Suffix Search List section. Impact of Workaround: When a domain suffix search list is configured on client systems, only that suffix list is used in DNS queries. The primary DNS suffix and any connection-specific DNS suffixes are not used. The DNS resolver will not perform devolution, potentially breaking any applications or configurations that rely on this behavior. |
Original Source
Url : http://www.microsoft.com/technet/security/advisory/971888.mspx |
Alert History
Date | Informations |
---|---|
2013-02-06 19:08:08 |
|