[dns-operations] "Cybercrooks exploiting new Windows DNS flaw"

Fergie fergdawg at netzero.net
Fri Apr 13 20:52:58 UTC 2007


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -- Roland Dobbins <rdobbins at cisco.com> wrote:

>On Apr 13, 2007, at 1:44 PM, Stasiniewicz, Adam wrote:
>
>> But not one of them are running external Windows DNS servers.  I am  
>> referring to those small and medium size companies who use Windows  
>> for their internal and external DNS.  As those will be the only  
>> people who would make a Windows DNS server Internet accessible
>
>Again, this is an unsupported assertion, as are the other assertions  
>about firewalls and about filtering policies.
>
>We simply cannot make such sweeping generalizations (well, we can,  
>but their probative value is nil).
>

You probably have already seen this, but for what it's worth:

 http://www.us-cert.gov/cas/techalerts/TA07-103A.html

It at least contains good advice about how to disable the
RPC vulnerability until a patch is issued.

- - ferg

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.6.0 (Build 214)

wj8DBQFGH+2jq1pz9mNUZTMRArBAAKCN4IiSJ/HBMFJG325LWk58Y6lQCQCeP/rE
GTkAY4HCBnL5H87Hsa63No0=
=jV5C
-----END PGP SIGNATURE-----



--
"Fergie", a.k.a. Paul Ferguson
 Engineering Architecture for the Internet
 fergdawg(at)netzero.net
 ferg's tech blog: http://fergdawg.blogspot.com/




More information about the dns-operations mailing list