Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Windows Server DNS flaw allows remote code execution
iTnews ^ | Dec 9 2015 6:30AM (AUS) | Juha Saarinen

Posted on 12/08/2015 10:19:18 PM PST by Utilizer

No workarounds.

Microsoft is warning users runing the Domain Name Service (DNS) look up feature on Windows Server to patch their installations against a critical vulnerability that permits attackers to remotely execute code on affected machines.

The vulnerability has been assigned the common vulnerabilities and exploits index term CVE-2015-6125 and affects 32 and 64-bit versions of Windows Server 2008, 2008 R2, 2012 and 2012 R2, and the stripped-down Server Core variants, Microsoft said.

Windows Server Technical Preview 3 and 4 are also affected

(Excerpt) Read more at itnews.com.au ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: dns; security; server; windows; windowspinglist
More difficulties for the 'doze Server...
1 posted on 12/08/2015 10:19:18 PM PST by Utilizer
[ Post Reply | Private Reply | View Replies]

To: dayglored

Ping!


2 posted on 12/08/2015 10:19:48 PM PST by Utilizer (Bacon A'kbar! - In world today are only peaceful people, and the muzlims trying to kill them)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Utilizer


Less Than $700 To Go!!
Please Help To Keep The
"Conservative News and Views"
On FR Coming By "Clicking Here"!!


Sponsoring FReepers are contributing
$10 Each time a New Monthly Donor signs up!
Get more bang for your FR buck!
Click Here To Sign Up Now!

3 posted on 12/08/2015 10:29:36 PM PST by musicman (Until I see the REAL Long Form Vault BC, he's just "PRES__ENT" Obama = Without "ID")
[ Post Reply | Private Reply | To 2 | View Replies]

To: Utilizer; Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; Alas Babylon!; amigatec; ...
Whoopsie on the DNS service... PING!

You can find all the Windows Ping list threads with FR search: just search on keyword "windowspinglist".

Thanks to Utilizer for the ping!!

4 posted on 12/08/2015 11:33:44 PM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: Utilizer

I have to speak to this at a management meeting this morning. Here are some of the finer points:

1. This is targeted at Internet-facing DNS servers. The likelihood of an external attack against a NATted private network is very small.

2. Server 2012 Active Directory domain controllers require the installation of DNS during promotion, making DCs particularly vulnerable.

3. If you’re running external resolvers on DCs, shame on you.

4. While Microsoft states there are no mitigating controls, blocking TCP 53 on edge firewalls prevents DNS lookups from getting to your servers.

and... again...

5. See #3

This is, again, much ado about nothing if you’re an enterprise-minded system administrator. I’ve never worked for a company that used Windows for edge DNS resolution. That’s usually handled at the ISP or by GTMs in the DMZ.


5 posted on 12/09/2015 4:24:37 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

I can probably guess this is a bigger issue in the third world.


6 posted on 12/09/2015 4:28:42 AM PST by miliantnutcase
[ Post Reply | Private Reply | To 5 | View Replies]

To: Utilizer

How several thousand self-congratulating and thoroughly egotistical software engineers can accidentally build a back door into everything they write is bewildering.


7 posted on 12/09/2015 6:49:36 AM PST by GingisK
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson