VID |
26309 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The hotfix (941672) for 'Spoofing Vulnerability in Vulnerability in DNS' has not been applied. Microsoft Windows 2000 Server SP4, Server 2003 SP1, and Server 2003 SP2 could allow non-privileged users to send malicious DNS responses and poison the cache of a Windows DNS server. This could cause client machines that use the DNS server to be redirected to malicious domains as the result of an incorrect DNS response.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms07-062.mspx http://www.securityfocus.com/archive/1/archive/1/483635/100/0/threaded http://www.securityfocus.com/archive/1/archive/1/483698/100/0/threaded http://www.frsirt.com/english/advisories/2007/3848 http://www.securitytracker.com/id?1018942 http://www.kb.cert.org/vuls/id/484649 http://secunia.com/advisories/27584
* Platforms Affected: Microsoft Windows 2000 Server SP4 Microsoft Windows Server 2003 SP1 Microsoft Windows Server 2003 SP2 |
Recommendation |
Apply the appropriate patch (941672) for your system, as listed in Microsoft Security Bulletin MS07-062 at http://www.microsoft.com/technet/security/bulletin/ms07-062.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site at http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2007-3896 (CVE) |
Related URL |
25945 (SecurityFocus) |
Related URL |
35582,38315 (ISS) |
|