MS09-008: Vulnerabilities in DNS Server Could Allow Spoofing (961063) (uncredentialed check)

medium Nessus Plugin ID 72835


The DNS server running on the remote host is vulnerable to DNS spoofing attacks.


According to its self-reported version number, the Microsoft DNS Server running on the remote host has the following vulnerabilities :

- An issue exists in installations where dynamic updates are enabled and ISATAP and WPAD are not already registered in DNS due to the lack of restricting registration on the 'wpad' hostname. A remote, authenticated attacker can exploit this issue to perform a man-in-the-middle attack. (CVE-2009-0093)

- An issue exists that allows a remote, unauthenticated attacker to quickly and reliably spoof responses and insert records into the DNS server's cache.

- An issue exists in the DNS Resolver Cache Service due to improper caching of DNS responses that could allow a remote, unauthenticated attacker to predict transaction IDs and poison caches by sending many crafted DNS queries. (CVE-2009-0234)

These issues may allow remote attackers to redirect network traffic intended for systems on the Internet to the attacker's own systems.


Microsoft has released a set of patches for Windows 2000, 2003 and 2008.

See Also

Plugin Details

Severity: Medium

ID: 72835

File Name: ms_dns_kb961063.nasl

Version: 1.10

Type: remote

Family: DNS

Published: 3/5/2014

Updated: 8/5/2020

Configuration: Enable paranoid mode

Risk Information


Risk Factor: Low

Score: 3.7


Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: ms_dns/version, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 3/10/2009

Vulnerability Publication Date: 3/10/2009

Reference Information

CVE: CVE-2009-0093, CVE-2009-0233, CVE-2009-0234

BID: 33982, 33988, 33989

MSFT: MS09-008

IAVA: 2009-A-0018-S

MSKB: 961063

CWE: 20