Vulnerability Name:
CVE-2001-1452 (CCN-3675)
Assigned:
1999-09-30
Published:
1999-09-30
Updated:
2019-04-30
Summary:
By default, DNS servers on Windows NT 4.0 and Windows 2000 Server cache glue records received from non-delegated name servers, which allows remote attackers to poison the DNS cache via spoofed DNS responses.
CVSS v3 Severity:
5.3 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Low
Availibility (A):
None
CVSS v2 Severity:
5.0 Medium
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
5.0 Medium
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Informational
References:
Source: CCN
Type: Caldera International, Inc. Security Advisory SA-1997.16
Vulnerability in BIND
Source: MITRE
Type: CNA
CVE-2001-1452
Source: CCN
Type: Microsoft MSDN Library
SecureResponses
Source: MSKB
Type: Vendor Advisory
Q241352
Source: CCN
Type: CERT Advisory CA-1997-22
BIND - the Berkeley Internet Name Daemon
Source: CCN
Type: US-CERT VU#109475
Microsoft Windows NT and 2000 Domain Name Servers allow non-authoritative RRs to be cached by default
Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#109475
Source: CCN
Type: Microsoft Windows 2000 Server Documentation
To secure server cache against names pollution
Source: CCN
Type: OSVDB ID: 19187
Microsoft Windows NT/2000 DNS Server Non-delegated NS Glue Record Cache Poisoning
Source: CCN
Type: BID-678
Multiple Vendor BIND Cache Poisoning Vulnerability
Source: BID
Type: Vendor Advisory
6791
Source: CCN
Type: BID-6791
Microsoft Windows DNS Resource Record Cache Corruption Vulnerability
Source: XF
Type: UNKNOWN
nt-ms-dns-cachepollution(3675)
Source: XF
Type: UNKNOWN
nt-ms-dns-cachepollution(3675)
Source: CCN
Type: Microsoft Knowledge Base Article 241352
How to Prevent DNS Cache Pollution
Vulnerable Configuration:
Configuration 1
:
cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp1:*:*:server:*:x86:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp1:*:*:terminal_server:*:x86:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp2:*:*:server:*:x86:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp2:*:*:terminal_server:*:x86:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp3:enterprise_server:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp3:*:*:server:*:x86:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp3:*:*:terminal_server:*:x86:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp4:*:*:server:*:x86:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp4:*:*:terminal_server:*:x86:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp5:*:*:server:*:x86:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp5:*:*:terminal_server:*:x86:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp6:*:*:server:*:x86:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp6:*:*:terminal_server:*:x86:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:*
OR
cpe:/o:microsoft:windows_nt:4.0:sp6a:*:*:server:*:x86:*
Configuration CCN 1
:
cpe:/o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*
OR
cpe:/o:microsoft:windows_2000:*:*:*:*:*:*:*:*
OR
cpe:/a:caldera:network_desktop:1.0:*:*:*:*:*:*:*
OR
cpe:/o:caldera:openlinux_lite:1.1:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
microsoft
windows 2000 *
microsoft
windows nt 4.0
microsoft
windows nt 4.0
microsoft
windows nt 4.0
microsoft
windows nt 4.0 sp1
microsoft
windows nt 4.0 sp1
microsoft
windows nt 4.0 sp1
microsoft
windows nt 4.0 sp2
microsoft
windows nt 4.0 sp2
microsoft
windows nt 4.0 sp2
microsoft
windows nt 4.0 sp3
microsoft
windows nt 4.0 sp3
microsoft
windows nt 4.0 sp3
microsoft
windows nt 4.0 sp4
microsoft
windows nt 4.0 sp4
microsoft
windows nt 4.0 sp4
microsoft
windows nt 4.0 sp5
microsoft
windows nt 4.0 sp5
microsoft
windows nt 4.0 sp5
microsoft
windows nt 4.0 sp6
microsoft
windows nt 4.0 sp6
microsoft
windows nt 4.0 sp6
microsoft
windows nt 4.0 sp6a
microsoft
windows nt 4.0 sp6a
microsoft
windows nt 4.0
microsoft
windows 2000 *
caldera
network desktop 1.0
caldera
openlinux lite 1.1