Executive Summary

Summary
Title Vulnerability in DNS Could Allow Spoofing (941672)
Informations
Name MS07-062 First vendor Publication 2007-11-13
Vendor Microsoft Last vendor Modification 2007-11-13
Severity (Vendor) Important Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:P)
Cvss Base Score 6.4 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

This important security update resolves a privately reported vulnerability. This spoofing vulnerability exists in Windows DNS Servers and could allow an attacker to send specially crafted responses to DNS requests, thereby spoofing or redirecting Internet traffic from legitimate locations.

Original Source

Url : http://www.microsoft.com/technet/security/bulletin/ms07-062.mspx

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-16 Configuration

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:4395
 
Oval ID: oval:org.mitre.oval:def:4395
Title: Vulnerability in DNS Could Allow Spoofing
Description: The DNS server in Microsoft Windows 2000 Server SP4, and Server 2003 SP1 and SP2, uses predictable transaction IDs when querying other DNS servers, which allows remote attackers to spoof DNS replies, poison the DNS cache, and facilitate further attack vectors.
Family: windows Class: vulnerability
Reference(s): CVE-2007-3898
Version: 3
Platform(s): Microsoft Windows 2000
Microsoft Windows Server 2003
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 20
Os 11
Os 3

OpenVAS Exploits

Date Description
2009-03-05 Name : Microsoft Windows DNS Memory Corruption Vulnerability - Mar09
File : nvt/secpod_ms_dns_mem_corr_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
41092 Microsoft Windows DNS Service Predictable Transaction ID Weakness

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Windows DNS server spoofing attempt
RuleID : 16206 - Revision : 12 - Type : OS-WINDOWS
2014-01-10 dns cache poisoning attempt
RuleID : 13667 - Revision : 19 - Type : PROTOCOL-DNS

Nessus® Vulnerability Scanner

Date Description
2014-03-05 Name : The DNS server running on the remote host is vulnerable to DNS spoofing attacks.
File : ms_dns_kb941672.nasl - Type : ACT_GATHER_INFO
2007-11-13 Name : Remote DNS server is vulnerable to spoofing attacks.
File : smb_nt_ms07-062.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2014-03-06 13:21:27
  • Multiple Updates
2014-02-17 11:45:48
  • Multiple Updates
2014-01-19 21:30:08
  • Multiple Updates
2013-05-11 12:22:04
  • Multiple Updates