Check Point Reference: | CPAI-2013-1646 |
Date Published: | 9 Apr 2013 |
Severity: | Critical |
Last Updated: | Tuesday 09 April, 2013 |
Source: | |
Industry Reference: | CVE-2009-0234 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | A weakness exists in Microsoft DNS server implementation. The problem is caused by improper handling of negative results for DNS ANY queries. Remote attackers could exploit this vulnerability by sending numerous ANY queries to the target server, followed by malicious responses to the same server. Successful exploitation of this vulnerability would lead to the cache poisoning of the vulnerable DNS server. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: DNS Enforcement Violation.
Attack Information: Microsoft DNS Server validation spoofing (MS09-008) - high confidence