Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Misconfigured DNS servers vulnerable to domain info leak

Misconfigured DNS servers vulnerable to domain info leak

2015/04/14

Softpedia - (International) The U.S. Computer Emergency Readiness Team (US-CERT) released a security statement warning that misconfigured, public-facing domain name system (DNS) servers utilizing Asynchronous Transfer Full Range (AXFR) protocols are vulnerable to system takeovers, redirects to spoofed addresses, and denial-of-service (DoS) attacks from unauthenticated users via DNS zone transfer requests. Research from Alexa revealed that over 72,000 domains and 48,000 nameservers were affected by the issue.

Source: http://news.softpedia.com/news/Misconfigured-DNS-Servers-Vulnerable-to-Domain-Info-Leak-478331.shtml

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:24:05