Microsoft Windows DNS Service Buffer Overflow Vulnerability
Secunia Advisory: SA24871 Release Date: 2007-04-13
Critical: Highly critical
Impact: System access
Where: From local network
Solution Status: Vendor Workaround
Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Server
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows Storage Server 2003
A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to a boundary error in an RPC interface of the DNS service used for remote management of the service. This can be exploited to cause a stack-based buffer overflow via a specially crafted RPC request.
Successful exploitation allows execution of arbitrary code with SYSTEM privileges.
NOTE: According to Microsoft, this is already being actively exploited on a limited scale.
Solution: The vendor recommends disabling the remote management over RPC capability for DNS servers.
Provided and/or discovered by: Discovered as a 0-day.
Original Advisory: Microsoft: