{"id":14559,"date":"2020-05-24T11:19:01","date_gmt":"2020-05-24T09:19:01","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=14559"},"modified":"2022-01-05T15:29:37","modified_gmt":"2022-01-05T14:29:37","slug":"windows-dns-server-denial-of-service-schwachstelle","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/05\/24\/windows-dns-server-denial-of-service-schwachstelle\/","title":{"rendered":"Windows DNS Server Denial of Service vulnerability"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/05\/24\/windows-dns-server-denial-of-service-schwachstelle\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Another addendum from last week. Microsoft has issued a security advisory regarding a DNS Server Denial of Service vulnerability in Windows. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg04.met.vgwort.de\/na\/9fbf9ba80d4f4990926b68aa6efda136\" width=\"1\" height=\"1\">The whole thing kind of stuck with me because it was flushed into my mailbox on 5\/20\/20\/20. Here is the notification.<\/p>\n<p>*********************************************************************<br \/>Title: Microsoft Security Advisory Notification<br \/>Issued: May 19, 2020<br \/>*********************************************************************<\/p>\n<p>Security Advisories Released or Updated on May 19, 2020<br \/>=======================================================<\/p>\n<p>* Microsoft Security Advisory ADV200009<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0835ADV200009\" target=\"_blank\" rel=\"noopener noreferrer\">ADV200009<\/a> | Windows DNS Server Denial of Service Vulnerability<br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: May 19, 2020<br \/>&#8211; Updated: N\/A<br \/>&#8211; Version: 1.0<\/p>\n<p>The background is explained by Microsoft in <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0835ADV200009\" target=\"_blank\" rel=\"noopener noreferrer\">ADV200009<\/a>.Microsoft is aware of a vulnerability related to packet forwarding in DNS resolution for Windows servers. An attacker could exploit this vulnerability for DoS attacks, causing the DNS server service to stop responding.<\/p>\n<h2>The vulnerability from Microsoft's perspective<\/h2>\n<p>To exploit this vulnerability, an attacker would have to have access to at least one client and one domain that responds with a large set of reference records without glue records that point to external victim subdomains. When resolving a name from the attacker's client, the resolver contacts the victim's domain for each reference record found. This action can generate a large number of communications between the recursive resolver and the victim's authoritative DNS server to trigger a Distributed Denial of Service (DDoS) attack.<\/p>\n<h2>The NXNSAttack <\/h2>\n<p>If I haven't got it wrong, this should be the NXNSAttack problem (amplification attacks on the name servers) linked in the above tweet<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/NXNSAttack?src=hash&amp;ref_src=twsrc%5Etfw\">#NXNSAttack<\/a> can abuse <a href=\"https:\/\/twitter.com\/hashtag\/DNS?src=hash&amp;ref_src=twsrc%5Etfw\">#DNS<\/a> servers for amplifying <a href=\"https:\/\/twitter.com\/hashtag\/DoS?src=hash&amp;ref_src=twsrc%5Etfw\">#DoS<\/a> attacks. Please patch  <a href=\"https:\/\/twitter.com\/hashtag\/BIND?src=hash&amp;ref_src=twsrc%5Etfw\">#BIND<\/a> (CVE-2020-8616), <a href=\"https:\/\/twitter.com\/hashtag\/Unbound?src=hash&amp;ref_src=twsrc%5Etfw\">#Unbound<\/a> (CVE-2020-12662), <a href=\"https:\/\/twitter.com\/hashtag\/Knot?src=hash&amp;ref_src=twsrc%5Etfw\">#Knot<\/a> (CVE-2020-12667) und <a href=\"https:\/\/twitter.com\/hashtag\/PowerDNS?src=hash&amp;ref_src=twsrc%5Etfw\">#PowerDNS<\/a> (CVE-2020-10995) etc. &#8211; <a href=\"https:\/\/t.co\/hFr0Tsp8SV\">https:\/\/t.co\/hFr0Tsp8SV<\/a> <a href=\"https:\/\/t.co\/Ho4gilqbpk\">pic.twitter.com\/Ho4gilqbpk<\/a><\/p>\n<p>\u2014 CERT-Bund (@certbund) <a href=\"https:\/\/twitter.com\/certbund\/status\/1263578534150156288?ref_src=twsrc%5Etfw\">May 21, 2020<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/p>\n<p>Microsoft has outlined workarounds and workarounds that administrators can use to mitigate the problem in <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0835ADV200009\" target=\"_blank\" rel=\"noopener noreferrer\">ADV200009<\/a>. It boils down to the Response Rate Limit. Microsoft has described this in <a href=\"https:\/\/docs.microsoft.com\/en-us\/powershell\/module\/dnsserver\/set-dnsserverresponseratelimiting?view=win10-ps\" target=\"_blank\" rel=\"noopener noreferrer\">this document<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Another addendum from last week. Microsoft has issued a security advisory regarding a DNS Server Denial of Service vulnerability in Windows.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[69,194],"class_list":["post-14559","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/14559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=14559"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/14559\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=14559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=14559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=14559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}