By default, DNS servers on Windows NT 4.0 and Windows 2000 Server cache glue records received from non-delegated name servers, which allows remote attackers to poison the DNS cache via spoofed DNS responses.
The product does not properly verify that the source of data or communication is valid.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/3675 | third party advisory vdb entry |
http://www.securityfocus.com/bid/6791 | vdb entry vendor advisory broken link third party advisory |
http://www.kb.cert.org/vuls/id/109475 | third party advisory us government resource |
http://support.microsoft.com/default.aspx?scid=KB%3Ben-us%3Bq241352 | patch vendor advisory broken link |