MS-RPC: Malformed RPC DNS Request

This signature detects attempts to exploit a known vulnerability against Microsoft DNS Server. A remote code execution vulnerability exists in the RPC interface of Microsofts DNS Server because of the way that it handles certain RPC functions. Microsoft Windows 2000 Server Service Pack 4, Windows Server 2003 Service Pack 1, and Windows Server 2003 Service Pack 2 are affected. A successful attack allows arbitrary code execution at SYSTEM level.

Extended Description

Microsoft Windows Domain Name System (DNS) Server Service is prone to a stack-based buffer-overflow vulnerability in its Remote Procedure Call (RPC) interface. A remote attacker may exploit this issue to run arbitrary code in the context of the DNS Server Service. The DNS service runs in the 'SYSTEM' context. Successfully exploiting this issue allows attackers to execute arbitrary code, facilitating the remote compromise of affected computers. Windows Server 2000 Service Pack 4, Windows Server 2003 Service Pack 1, and Windows Server 2003 Service Pack 2 are confirmed vulnerable to this issue. Microsoft Windows 2000 Professional SP4, Windows XP SP2, and Windows Vista are not affected by this vulnerability.

Affected Products

Microsoft windows_server_2003_x64

Short Name
MS-RPC:MAL-DNS
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
MS-RPC
Keywords
CVE-2007-1748 DNS Malformed RPC Request bid:23470
Release Date
04/13/2007
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3725
False Positive
Unknown
Vendors

Microsoft

CVSS Score

10.0

Found a potential security threat?