Microsoft KB Archive/268082

= DNS SOA Record May Reveal Administrator Account Name =

Article ID: 268082

Article Last Modified on 2/20/2007

-

APPLIES TO


 * Microsoft Windows NT Server 4.0, Terminal Server Edition
 * Microsoft Windows 2000 Server
 * Microsoft Windows 2000 Advanced Server
 * Microsoft Windows 2000 Professional Edition
 * Microsoft Windows NT Server 4.0 Standard Edition
 * Microsoft Windows NT Server 4.0 Enterprise Edition
 * Microsoft Windows NT Workstation 4.0 Developer Edition

-



This article was previously published under Q268082



SYMPTOMS
Creating a new zone file in Domain Name System (DNS) could compromise the name of the Administrator account, even if the Administrator account has been renamed.



CAUSE
When you create a DNS zone, the name of the logged-on user is automatically placed in the Responsible Person field in the Start of Authority (SOA) property for the new zone. If you log on with the Administrator account, or with a renamed Administrator account, that account name is placed in the field. Because this name is publicly accessible, it could give a malicious user a way to learn the logon name of the administrator who created the account.



Windows 2000
To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

260910 How to Obtain the Latest Windows 2000 Service Pack

The English version of this fix should have the following file attributes or later:   Date      Time    Version        Size     File name 07/24/00 4:07PM  5.0.2195.2103  699,664  Dnsmgr.dll

Windows NT 4.0
To resolve this problem, obtain the Windows NT 4.0 Security Rollup Package. For additional information, click the article number below to view the article in the Microsoft Knowledge Base:

299444 Post-Windows NT 4.0 Service Pack 6a Security Rollup Package (SRP)

The English version of this fix should have the following file attributes or later:   Date      Time    Version     Size     File name     Platform -  07/21/00  8:02PM  4.0.1306.1  137,488  Dnsadmin.exe  Intel 07/21/00 8:00PM  4.0.1306.1  187,152  Dnsadmin.exe  Alpha

Microsoft Windows NT Server version 4.0, Terminal Server Edition
To resolve this problem, obtain the Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package (SRP). For additional information about the SRP, click the article number below to view the article in the Microsoft Knowledge Base:

317636 Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package



WORKAROUND
After you create a zone file in DNS, select the properties for the zone and then change the name of the responsible user to a name other than the administrator on the SOA tab (Windows 2000) or in SOA properties (Windows NT 4.0).



Windows 2000
Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article. This problem was first corrected in Windows 2000 Service Pack 2.

Windows NT 4.0
Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Windows NT 4.0.

Additional query words: security_patch

Keywords: kbhotfixserver kbqfe kbbug kbfix kbsecurity kbsecvulnerability kbwin2000presp2fix KB268082

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.