Lucene search

K
saintSAINT CorporationSAINT:ABA2C56A204EA004DE43C1EF6553A81D
HistoryApr 16, 2007 - 12:00 a.m.

Windows DNS server RPC management interface buffer overflow

2007-04-1600:00:00
SAINT Corporation
download.saintcorporation.com
11

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.967 High

EPSS

Percentile

99.5%

Added: 04/16/2007
CVE: CVE-2007-1748
BID: 23470
OSVDB: 34100

Background

The Windows DNS service runs an RPC management interface which listens on a dynamically assigned TCP port.

Problem

A buffer overflow vulnerability in the Windows DNS service allows remote attackers to execute arbitrary commands by sending a specially crafted RPC request to the management interface port.

Resolution

See Microsoft Security Advisory 935964 for information on available updates and workarounds.

References

<http://www.us-cert.gov/cas/techalerts/TA07-103A.html&gt;

Limitations

Exploit works on Windows 2000 SP0 to SP4 and Windows Server 2003 SP1 and SP2.

Platforms

Windows 2000
Windows Server 2003

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.967 High

EPSS

Percentile

99.5%