The DNS server in Microsoft Windows Server 2003 SP2 and Server 2008 SP2, R2, and R2 SP1 does not properly handle objects in memory during record lookup, which allows remote attackers to cause a denial of service (daemon restart) via a crafted query, aka "DNS Denial of Service Vulnerability."
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://secunia.com/advisories/48394 | third party advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-017 | vendor advisory |
http://www.securityfocus.com/bid/52374 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15098 | vdb entry signature |
http://www.us-cert.gov/cas/techalerts/TA12-073A.html | third party advisory us government resource |
http://osvdb.org/80005 | vdb entry |
http://www.securitytracker.com/id?1026789 | vdb entry |