(MS11-058) Vulnerabilities in DNS Server Could Allow Remote Code Execution (2562485)
Publish Date: 24 de августа de 2011
Severity: : Critical
CVE Kennungen: : CVE-2011-1966,CVE-2011-1970
Advisory Date: 24 de августа de 2011
DESCRIPTION
This security update resolves two privately reported vulnerabilities in Windows DNS server. The more severe of these vulnerabilities could allow remote code execution if an attacker registers a domain, creates an NAPTR DNS resource record, and then sends a specially crafted NAPTR query to the target DNS server. Servers without the DNS role enabled are not at risk.
INFORMATION EXPOSURE
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
SOLUTION
Patch: : http://www.microsoft.com/technet/security/bulletin/MS11-058.mspx
Trend Micro Deep Security DPI Rule Number: 1004761
Trend Micro Deep Security DPI Rule Name: DNS NAPTR Query Vulnerability (CVE-2011-1966)
AFFECTED SOFTWARE AND VERSION:
- Windows Server 2003 Service Pack 2
- Windows Server 2003 x64 Edition Service Pack 2
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 R2 for x64-based Systems
- Windows Server 2008 R2 for x64-based Systems Service Pack 1