By default, DNS servers on Windows NT 4.0 and Windows 2000 Server cache glue records received from non-delegated name servers, which allows remote attackers to poison the DNS cache via spoofed DNS responses.
References
Link | Resource |
---|---|
http://support.microsoft.com/default.aspx?scid=KB%3Ben-us%3Bq241352 | Broken Link Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/109475 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/6791 | Broken Link Third Party Advisory VDB Entry Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/3675 | Third Party Advisory VDB Entry |
http://support.microsoft.com/default.aspx?scid=KB%3Ben-us%3Bq241352 | Broken Link Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/109475 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/6791 | Broken Link Third Party Advisory VDB Entry Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/3675 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://support.microsoft.com/default.aspx?scid=KB%3Ben-us%3Bq241352 - Broken Link, Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/109475 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/6791 - Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/3675 - Third Party Advisory, VDB Entry |
08 Feb 2024, 20:47
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp3:server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp5:server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:enterprise_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp6:server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp2:enterprise_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp4:enterprise_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:*:enterprise_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp5:enterprise_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp6:enterprise_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp1:server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp4:server:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:* |
CWE | CWE-346 | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/3675 - Third Party Advisory, VDB Entry | |
References | (BID) http://www.securityfocus.com/bid/6791 - Broken Link, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | () http://support.microsoft.com/default.aspx?scid=KB%3Ben-us%3Bq241352 - Broken Link, Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
07 Nov 2023, 01:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2001-08-31 04:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1452
Mitre link : CVE-2001-1452
CVE.ORG link : CVE-2001-1452
JSON object : View
Products Affected
microsoft
- windows_2000
- windows_nt
CWE
CWE-346
Origin Validation Error