We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,258 News Articles

Microsoft reveals dangerous DNS flaw

Windows Server vulnerability revealed

Attackers are trying to take advantage of a newly-disclosed vulnerability in several of Microsoft's server products that could allow them to run unauthorised code on affected computers, the company has warned.

The attacks are limited so far, according to a Microsoft advisory. The company is working on a patch but no release date has been set, a spokeswoman in London said.

Microsoft just issued seven critical patches on Tuesday, its monthly patch day, and isn't due for another round until 8 May. The company did issue an emergency patch on 3 April for a dangerous animated cursor flaw, but it does not typically stray from its regular patch schedule.

The vulnerability lies in the DNS (domain name system) Server Service, which looks up numerical IP (Internet Protocol) addresses to allow a website to be called into a browser. The affected products are Windows 2000 Server Service Pack 4, and Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2.

The flaw can cause a stack-based buffer overrun in the DNS Server's RPC (remote procedure call) interface. RPC is a protocol through which a program can request a service from an application on another machine on a network.

An attacker could try to exploit the problem by sending a special RPC packet to the system, which then could allow code to run in the "security context of the Domain Name System Server Service”, Microsoft said.

Microsoft listed several ways to block an attack until a patch is issued. Administrators can disable RPC's remote management capability through the registry key settings, Microsoft said. The SANS Institute, which monitors the health of the internet and conducts security training, recommended this option.

Other workarounds include blocking ports 1024 to 5000 on the firewall, which are used by the RPC protocol, and enabling advanced TCP/IP filtering, Microsoft said.

Danish security vendor Secunia AsP rated the problem as recommended this option in an advisory.


IDG UK Sites

The best iPhone 6 alternatives: Price and specs compared with the best smartphones

IDG UK Sites

The top 10 Apple products ranked by pixel density: Which Apple devices have the sharpest screens?

IDG UK Sites

SBTRKT's Look Away webcam-based interactive music video won't keep your gaze

IDG UK Sites

Retina MacBook Air release date rumours and specs: Gold 12in Retina MacBook Air almost 1cm thinner...