(MS11-058) Vulnerabilities in DNS Server Could Allow Remote Code Execution (2562485)

  Severity: CRITICAL
  CVE Identifier: CVE-2011-1966,CVE-2011-1970
  Advisory Date: AUG 24, 2011

  DESCRIPTION

This security update resolves two privately reported vulnerabilities in Windows DNS server. The more severe of these vulnerabilities could allow remote code execution if an attacker registers a domain, creates an NAPTR DNS resource record, and then sends a specially crafted NAPTR query to the target DNS server. Servers without the DNS role enabled are not at risk.

  TREND MICRO PROTECTION INFORMATION

Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.

  SOLUTION

  PATCH: http://www.microsoft.com/technet/security/bulletin/MS11-058.mspx

  Trend Micro Deep Security DPI Rule Number: 1004761
  Trend Micro Deep Security DPI Rule Name: DNS NAPTR Query Vulnerability (CVE-2011-1966)

  AFFECTED SOFTWARE AND VERSION

  • Windows Server 2003 Service Pack 2
  • Windows Server 2003 x64 Edition Service Pack 2
  • Windows Server 2003 with SP2 for Itanium-based Systems
  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 R2 for x64-based Systems
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1