VID |
27040 |
Severity |
30 |
Port |
135 |
Protocol |
TCP |
Class |
WMI |
Detailed Description |
DNS service is running on the remote system. Dynamically updated whenever there are changes to the DNS client computer, their resource records with a DNS server can register and dynamically update and use this feature, especially if you frequently move or change locations and obtain an IP address via DHCP administration of zone records, clients can reduce the manual job. However, if you use dynamic updates, a malicious user data can be accepted, so should not be used for dynamic updates. - If not use, DNS service should be disabled.
* The vulnerability checks a service name(DNS) specified in the ministry of security and public administration notify in supplement of 2012-54. If the service name different, it might be a false positive.
* Platforms Affected: Microsoft Windows Any version |
Recommendation |
DNS service should be disabled.
1. Run> SERVICES.MSC> DNS> Properties 2. Startup type -> Disabled, Service status -> Stop Set |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|