Click Here to Install Silverlight*
United StatesChange|All Microsoft Sites
Microsoft TechNet
|TechCenters|Downloads|TechNet Program|Subscriptions|Security Bulletins|Archive
Search for

Microsoft Security Bulletin MS07-062 – Important

Vulnerability in DNS Could Allow Spoofing (941672)

Published: November 13, 2007

Version: 1.0

General Information

Executive Summary

This important security update resolves a privately reported vulnerability. This spoofing vulnerability exists in Windows DNS Servers and could allow an attacker to send specially crafted responses to DNS requests, thereby spoofing or redirecting Internet traffic from legitimate locations.

This is an important security update for all supported editions of Microsoft Windows 2000 Server and Windows Server 2003. For more information, see the subsection, Affected and Non-Affected Software, in this section.

This security update addresses the vulnerability by increasing the randomness of DNS transaction IDs. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.

Recommendation: Microsoft recommends that customers apply the update at the earliest opportunity.

Known Issues: None

Affected and Non-Affected Software

The software listed here has been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle.

Affected Software

Operating SystemMaximum Security ImpactAggregate Severity RatingBulletins Replaced by This Update

Microsoft Windows 2000 Server Service Pack 4

Spoofing

Important

MS07-029

Windows Server 2003 Service Pack 1 and Windows Server 2003 Service Pack 2

Spoofing

Important

MS07-029

Windows Server 2003 x64 Edition and Windows Server 2003 x64 Edition Service Pack 2

Spoofing

Important

MS07-029

Windows Server 2003 with SP1 for Itanium-based Systems and Windows Server 2003 with SP2 for Itanium-based Systems

Spoofing

Important

MS07-029

Non-Affected Software

Operating System

Microsoft Windows 2000 Professional Service Pack 4

Windows XP Service Pack 2

Windows XP Professional x64 Edition and Windows XP Professional x64 Edition Service Pack 2

Windows Vista

Windows Vista x64

Frequently Asked Questions (FAQ) Related to This Security Update

Vulnerability Information

Severity Ratings and Vulnerability Identifiers

DNS Spoofing Attack Vulnerability – CVE-2007-3898

Update Information

Detection and Deployment Tools and Guidance

Security Update Deployment

Other Information

Acknowledgments

Microsoft thanks the following for working with us to help protect customers:

Alla Berzroutchko of Scanit for reporting the DNS Spoofing Attack Vulnerability – (CVE-2007-3898).

Amit Klein of Trusteer for reporting the DNS Spoofing Attack Vulnerability – (CVE-2007-3898).

Roy Arends of Nominet UK for reporting the DNS Spoofing Attack Vulnerability – (CVE-2007-3898).

Support

Customers in the U.S. and Canada can receive technical support from Microsoft Product Support Services at 1-866-PCSAFETY. There is no charge for support calls that are associated with security updates.

International customers can receive support from their local Microsoft subsidiaries. There is no charge for support that is associated with security updates. For more information about how to contact Microsoft for support issues, visit the International Support Web site.

Disclaimer

The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

Revisions

V1.0 (November 13, 2007): Bulletin published.


 

© 2009 Microsoft Corporation. All rights reserved. Contact Us |Terms of Use |Trademarks |Privacy Statement
Microsoft