Workaround implementeren – DNS kwetsbaarheid

Workaround implementeren – DNS kwetsbaarheid
26 mei 2020 Windesheimstoring
Wanneer:
26 mei 2020 @ 13:00 – 14:00
2020-05-26T13:00:00+02:00
2020-05-26T14:00:00+02:00
Waar:
W2005 0075

Er is een DNS kwetsbaarheid door Microsoft bekend gemaakt,

——————–
Microsoft is aware of a vulnerability involving packet amplification that affects Windows DNS servers.
An attacker who successfully exploited this vulnerability could cause the DNS Server service to become nonresponsive.
To exploit this vulnerability an attacker would need to have access to at least one client and a domain that replies with a large volume of referral records, without glue records, that point to external victim sub domains. While resolving a name from the attacker client, for each referral record found, the resolver contacts the victim domain. This action can generate a large number of communications between the recursive resolver and the victim’s authoritative DNS server to cause a Distributed Denial of Service (DDoS) attack.
——————-

Workaround implementeren op DNS servers om deze kwetsbaarheid te mitigeren.