DNS server vulnerability could allow denial of service
Report ID: MS201203001
Date Published: 14 March 2012
Compromise Type: denial-of-service
Compromise From: remote
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
A vulnerability in DNS server caused by improper handling of objects in memory could be used in a denial of service attack.
Microsoft has released a security update for its Windows Server products following a report on a denial of service vulnerability. The vulnerability exists when a Domain Name System (DNS) server fails to properly handle objects in memory while looking up a resource record. Upon successful exploit, tt could cause the target system to stop responding and restart.
This issue has been resolved in the latest security update, which modifies the way that the DNS server handles object in memory. Users are recommended to install this update to protect their system from potential exploit.
Install the latest security patch for applicable system, available for download from (https://technet.microsoft.com/en-us/security/bulletin/ms12-017)