Microsoft Issues Domain-Related Security Alert

Vulnerability affects how domain names are resolved, and comes with a number of interim steps for protection.


You Can't Detect What You Can't See: Illuminating the Entire Kill Chain

On-Demand Webinar

Microsoft on Monday issued a warning concerning a vulnerability in how Windows resolves hostnames, and is offering steps for systems administrators to work around the problem until a fix is issued.

The issue affects hostnames that do not include a fully qualified domain name (FQDN). A fully qualified domain name is a domain name that specifies the node's position in the DNS tree hierarchy and is often used for sub sections of domains or for functions. A fully qualified domain is distinguishable by a period after the top-level extension, like ".com."

This means third-level domains or deeper are vulnerable, such as mail.domainname.com or us.dbase.domainname.com. There are, however, mitigating factors, as detailed on the Microsoft Security Research Center alert page.

Microsoft has also issued several suggested workarounds until a patch is issued. These include creating a Proxy Auto-Configuration file, disabling Automatically Detect Settings in Internet Explorer, disabling DNS devolution and configuring a domain suffix search list.

This article was first published on InternetNews.com. To read the full article, click here.

Comment and Contribute


(Maximum characters: 1200). You have characters left.



IT Management Daily
Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that datamation.com may send you Datamation offers via email, phone and text message, as well as email offers about other products and services that Datamation believes may be of interest to you. Datamation will process your information in accordance with the Quinstreet Privacy Policy.