First published: Wed Mar 11 2009(Updated: )
The DNS Resolver Cache Service (aka DNSCache) in Windows DNS Server in Microsoft Windows 2000 SP4, Server 2003 SP1 and SP2, and Server 2008, when dynamic updates are enabled, does not reuse cached DNS responses in all applicable situations, which makes it easier for remote attackers to predict transaction IDs and poison caches by simultaneously sending crafted DNS queries and responses, aka "DNS Server Query Validation Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | =sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0233 is considered to have a moderate severity due to potential exploitation by remote attackers.
To mitigate CVE-2009-0233, it is recommended to apply the latest security updates from Microsoft.
CVE-2009-0233 affects Microsoft Windows 2000 SP4, Windows Server 2003 SP1 and SP2, and Windows Server 2008.
CVE-2009-0233 is a cache management vulnerability in the DNS Resolver Cache Service of Windows DNS Server.
Yes, CVE-2009-0233 can potentially allow remote attackers to predict transactional responses, leading to further attacks.