(MS11-058) Vulnerabilities in DNS Server Could Allow Remote Code Execution (2562485)
Publish Date: 24 août 2011
Gravité: : Critique
Identifiant(s) CVE: : CVE-2011-1966,CVE-2011-1970
Date du conseil: 24 août 2011
Description
This security update resolves two privately reported vulnerabilities in Windows DNS server. The more severe of these vulnerabilities could allow remote code execution if an attacker registers a domain, creates an NAPTR DNS resource record, and then sends a specially crafted NAPTR query to the target DNS server. Servers without the DNS role enabled are not at risk.
Information Exposure Rating:
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Solutions
Patch: : http://www.microsoft.com/technet/security/bulletin/MS11-058.mspx
Trend Micro Deep Security DPI Rule Number: 1004761
Trend Micro Deep Security DPI Rule Name: DNS NAPTR Query Vulnerability (CVE-2011-1966)
Affected software and version:
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 R2 for x64-based Systems
- Windows Server 2008 R2 for x64-based Systems Service Pack 1