First published: Fri Feb 17 2012(Updated: )
The resolver in the DNS Server service in Microsoft Windows Server 2008 before R2 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server | <=- | |
Microsoft Windows Server | ||
Microsoft Windows Server | =gold |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1194 is classified as a critical vulnerability due to the potential for remote exploitation.
To mitigate CVE-2012-1194, apply the latest security patches provided by Microsoft for Windows Server 2008.
CVE-2012-1194 can allow attackers to make revoked domain names resolvable, which compromises DNS integrity.
CVE-2012-1194 affects Microsoft Windows Server 2008 before R2, including all service packs.
If immediate patching is not possible, consider implementing firewall rules to restrict access to the DNS server.