[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2009-0233

Date: (C)2009-03-11   (M)2017-10-04
 
CVSS Score: 5.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 4.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: PARTIAL











The DNS Resolver Cache Service (aka DNSCache) in Windows DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008, when dynamic updates are enabled, does not reuse cached DNS responses in all applicable situations, which makes it easier for remote attackers to predict transaction IDs and poison caches by simultaneously sending crafted DNS queries and responses, aka "DNS Server Query Validation Vulnerability."

Reference:
SECTRACK-1021831
BID-33982
SECUNIA-34217
OSVDB-52517
ADV-2009-0661
IAVM:2009-A-0018
MS09-008
TA09-069A
http://blogs.technet.com/srd/archive/2009/03/13/ms09-008-dns-and-wins-server-security-update-in-more-detail.aspx
http://support.avaya.com/elmodocs2/security/ASA-2009-083.htm

CPE    8
cpe:/o:microsoft:windows_server_2008
cpe:/o:microsoft:windows_server_2003::sp1:itanium
cpe:/o:microsoft:windows_server_2003::sp2:x64
cpe:/o:microsoft:windows_server_2003::sp2:itanium
...
CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:2620
oval:org.mitre.oval:def:6228

© 2013 SecPod Technologies