R-229: Vulnerability in Windows DNS RPC Interface (935966)


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) R-229: Vulnerability in Windows DNS RPC Interface (935966)
# 1  
Old 12-24-2007
R-229: Vulnerability in Windows DNS RPC Interface (935966)

A remote code execution vulnerability exists in the Domain Name System (DNS) Server Service in all supported server versions of Windows that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system. The risk is HIGH. A remote code execution vulnerability exists in the Domain Name System (DNS) Server Service in all supported server versions of Windows that could allow an attacker who successfully exploited this vulnerability to take complete control of the affected system.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

DNS server choice: Windows DNS vs Linux BIND

I'd like to get some opnions on choosing DNS server: Windows DNS vs Linux BIND comparrsion: 1) managment, easy of use 2) Security 3) features 4) peformance 5) ?? I personally prefer Windows DNS server for management, it supports GUI and command line. But I am not sure about security... (2 Replies)
Discussion started by: honglus
2 Replies

2. Solaris

is RPC portable accross Unix and windows

Hi All, I am working on Unix(SunOS 5.8) and windows machine.My server lies on Unix machine and clinet on windows. Could you please tell me If I have created abc.x file for unix machine and have written a routine require for remote call, How do I proceed to get client code of RPC for windows... (0 Replies)
Discussion started by: navin_1234
0 Replies
Login or Register to Ask a Question
avahi-dnsconfd.action(8)				      System Manager's Manual					  avahi-dnsconfd.action(8)

NAME
avahi-dnsconfd.action - avahi-dnsconfd action script SYNOPSIS
/etc/avahi/avahi-dnsconfd.action DESCRIPTION
avahi-dnsconfd.action is the action script that is called whenever a new unicast DNS server is found or removed by avahi-dnsconfd. The default script as shipped with avahi patches /etc/resolv.conf to reflect the changed unicast DNS server configuration. PARAMETERS
argv[1] Contains the character "+" if the DNS server is new, "-" when it shall be removed from the DNS server list. argv[2] The IP address of the DNS server. argv[3] Numerical network interface number this DNS server was found on. argv[4] Numerical protocol number this DNS server was found on. (usually 2 for IPv4 and 10 for IPv6) ENVIRONMENT
AVAHI_INTERFACE Contains the textual interface name the corresponds with argv[3]. (e.g. "eth0") AVAHI_INTERFACE_DNS_SERVERS Contains a list of all DNS servers that avahi-dnsconfd found on the interface $AVAHI_INTERFACE, separated by spaces. AVAHI_DNS_SERVERS Contains a list of all DNS server that avahi-dnsconfd found on all interfaces, separated by spaces. AUTHORS
The Avahi Developers <avahi (at) lists (dot) freedesktop (dot) org>; Avahi is available from http://avahi.org/ SEE ALSO
avahi-dnsconfd(8), avahi-daemon(8) COMMENTS
This man page was written using xml2man(1) by Oliver Kurth. Manuals User avahi-dnsconfd.action(8)