back to article Old-school security hole perfect for worms and remote hijackings found lurking in Windows Server DNS code

Microsoft on Tuesday patched a wormable hole in its Windows Server software that can be exploited remotely to completely commandeer the machine without any authorization. It was one of hundreds of security bugs squashed today by Redmond along with Oracle, Adobe, VMware, SAP and Google. Microsoft emitted fixes for 123 …

  1. tip pc Silver badge
    Paris Hilton

    Windows really needs an application firewall.

    How long before exploits for these zero days are seen in the wild.

    Paris because M$ have been caught with their pants down once again.

    1. Cynic_999

      Re: Windows really needs an application firewall.

      Depends how easy it is to exploit in the real world. The description states that the bug will result in the processor executing "arbitary code", but the important point is whether the attacker can know or control the place where such code will be executed, and whether the attacker will be able to reasonably reliably place their malicious code in that place. IOW can an attacker ensure that the "arbitary code" is *their* code?

      Otherwise the attack is unlikely to do anything worse than crashing the system.

  2. Roger Kynaston
    Pint

    Try Red Hat for size

    exim, bind and selinux all being done at once.

    The exim one has also led to some real pain as it is a big change on only a minor version update.

    beer because I am going to need some once the patch cycle is over this month.

  3. oiseau
    Facepalm

    More of the same

    What's more, the bug appears to have been around for nearly 20 years.

    Incredible ... Just more of the same ...

    I wonder just how much more of this is still lurking inside MS software.

    O.

  4. MarkET

    "Considering Windows DNS servers are usually also Domain Controllers..."

    Really!

    Just waiting for trouble...

  5. fronty
    Mushroom

    Wow a 17 year old UXB!

    I'm amazed it's taken so long to find this, I thought this is the sort of thing fuzzing was supposed to discover?

    Great article here including a demonstration of this vuln, this is bad, very bad!

    https://thehackernews.com/2020/07/windows-dns-server-hacking.html

  6. Anonymous Coward
    Anonymous Coward

    What a BIND

  7. John Brown (no body) Silver badge

    Android bugs aplenty

    I wonder how many manufacturers or providers will pass on these bug fixes to phones more than 12 months old?

    1. Anonymous Coward
      Anonymous Coward

      Re: Android bugs aplenty

      Yeah, phones running Microsoft DNS are a thing

    2. JJKing
      Angel

      Re: Android bugs aplenty

      I have an old tablet running KitKat. Guess I need to be careful using it online then. Not going to replace it because it still does what I need it to do.

  8. Boris the Cockroach Silver badge
    FAIL

    what?

    Very large DNS packets?

    Buffer over runs?

    Are m$ STILL not comparing the size of the incoming data vs the amount of memory space allocated for it?

    After all these years and all that code review for new products?

    1. Anonymous Coward
      Anonymous Coward

      Re: what?

      https://www.cvedetails.com/cve/CVE-2019-10126/

  9. John_3_16

    Excuse me?

    Where are the Linux problems listed? Ohhh, yes, this kind of article is almost always exclusive to the M$ crowd.

    Stay safe all & according to this article, M$ is not helping...

  10. Anonymous Coward
    Anonymous Coward

    For the people who don't want to read all the details ..... reg patch to limit tcp rcv size

    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\DNS\Parameters" /v "TcpReceivePacketSize" /t REG_DWORD /d 0xFF00 /f

    net stop DNS && net start DNS

    1. This post has been deleted by its author

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like