First published: Wed Mar 11 2009(Updated: )
Windows DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008, when dynamic updates are enabled, does not restrict registration of the "wpad" hostname, which allows remote authenticated users to hijack the Web Proxy Auto-Discovery (WPAD) feature, and conduct man-in-the-middle attacks by spoofing a proxy server, via a Dynamic Update request for this hostname, aka "DNS Server Vulnerability in WPAD Registration Vulnerability," a related issue to CVE-2007-1692.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0093 allows attackers to hijack the Web Proxy Auto-Discovery feature, potentially leading to man-in-the-middle attacks.
CVE-2009-0093 affects Microsoft Windows 2000 SP4, Windows Server 2003 SP1 and SP2, and Windows Server 2008.
To mitigate CVE-2009-0093, disable dynamic updates for the DNS Server or restrict registrations for the 'wpad' hostname.
CVE-2009-0093 has a severity rating of important according to Microsoft's security guidelines.
Yes, Microsoft released a security update to address CVE-2009-0093, which should be applied to affected systems.