R-229: Vulnerability in Windows DNS RPC Interface (935966)


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) R-229: Vulnerability in Windows DNS RPC Interface (935966)
# 1  
Old 12-24-2007
R-229: Vulnerability in Windows DNS RPC Interface (935966)

A remote code execution vulnerability exists in the Domain Name System (DNS) Server Service in all supported server versions of Windows that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system. The risk is HIGH. A remote code execution vulnerability exists in the Domain Name System (DNS) Server Service in all supported server versions of Windows that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

DNS server choice: Windows DNS vs Linux BIND

I'd like to get some opnions on choosing DNS server: Windows DNS vs Linux BIND comparrsion: 1) managment, easy of use 2) Security 3) features 4) peformance 5) ?? I personally prefer Windows DNS server for management, it supports GUI and command line. But I am not sure about security... (2 Replies)
Discussion started by: honglus
2 Replies

2. Solaris

is RPC portable accross Unix and windows

Hi All, I am working on Unix(SunOS 5.8) and windows machine.My server lies on Unix machine and clinet on windows. Could you please tell me If I have created abc.x file for unix machine and have written a routine require for remote call, How do I proceed to get client code of RPC for windows... (0 Replies)
Discussion started by: navin_1234
0 Replies
Login or Register to Ask a Question
squid(8)                                                      System Manager's Manual                                                     squid(8)

NAME
squid - proxy caching server SYNOPSIS
squid [ -dhirsvzCDFINRVYX ] [ -l facility ] [ -f config-file ] [ -[ au ] port ] [ -k signal ] [ -n service-name ] [ -O cmd-line ] DESCRIPTION
squid is a high-performance proxy caching server for web clients, supporting FTP, gopher, and HTTP data objects. Unlike traditional caching software, squid handles all requests in a single, non-blocking, I/O-driven process. squid keeps meta data and especially hot objects cached in RAM, caches DNS lookups, supports non-blocking DNS lookups, and implements nega- tive caching of failed requests. squid supports SSL, extensive access controls, and full request logging. By using the lightweight Internet Cache Protocol, squid caches can be arranged in a hierarchy or mesh for additional bandwidth savings. squid consists of a main server program squid, a Domain Name System lookup program dnsserver, some optional programs for rewriting requests and performing authentication, and some management and client tools. When squid starts up, it spawns a configurable number of dnsserver processes, each of which can perform a single, blocking Domain Name System (DNS) lookup. This reduces the amount of time the cache waits for DNS lookups. squid is derived from the ARPA-funded Harvest Project http://harvest.cs.colorado.edu/ This manual page only lists the command line arguments. For details on how to configure squid see the file /etc/squid/squid.conf, the Squid FAQ and the documentation at the squid home page http://www.squid-cache.org OPTIONS
-d level Write debugging to stderr also. -f file Use the given config-file instead of /etc/squid/squid.conf -h Print help message. -i Install as a Windows Service (see -n option). -k reconfigure | rotate | shutdown | interrupt | kill | debug | check | parse Parse configuration file, then send signal to running copy (except -k parse) and exit. -n name Specify Windows Service name to use for service operations, default is: Squid -r Remove a Windows Service (see -n option). -s Enable logging to syslog. -l facility Use specified syslog facility. implies -s -u port Specify ICP port number (default: 3130), disable with 0. -v Print version. -z Create swap directories -C Do not catch fatal signals. -D Disable initial DNS tests. -F Don't serve any requests until store is rebuilt. -I Override first HTTP port with the bound socket passed in on standard input. -N No daemon mode. -O options Set Windows Service Command line options in Registry. -R Do not set REUSEADDR on port. -X Force full debugging. -Y Only return UDP_HIT or UDP_MISS_NOFETCH during fast reload. FILES
/etc/squid/squid.conf The main configuration file. You must initially make changes to this file for squid to work. For example, the default configura- tion does not allow access from any browser. /usr/share/doc/squid/examples/squid.conf Reference copy of the configuration file. Always kept up to date with the version of Squid you are using. Use this to look up con- figuration syntax after upgrading. /usr/share/squid/mime.conf (mime_table) MIME type mappings for FTP gatewaying /usr/share/squid/errors/en (error_directory) Error page templates SEE ALSO
cachemgr.cgi(8), ncsa_auth(8), pam_auth(8), squid_ldap_auth(8), squid_ldap_group(8), squid_session(8), squid_unix_group(8), The Squid FAQ Squid Web Proxy 2.7.STABLE9 2006-05-29 squid(8)