DNS SOA Record May Reveal Administrator Account Name

Article translations Article translations
Article ID: 268082 - View products that this article applies to.
This article was previously published under Q268082
This article has been archived. It is offered "as is" and will no longer be updated.
Expand all | Collapse all

On This Page

SYMPTOMS

Creating a new zone file in Domain Name System (DNS) could compromise the name of the Administrator account, even if the Administrator account has been renamed.

CAUSE

When you create a DNS zone, the name of the logged-on user is automatically placed in the Responsible Person field in the Start of Authority (SOA) property for the new zone. If you log on with the Administrator account, or with a renamed Administrator account, that account name is placed in the field. Because this name is publicly accessible, it could give a malicious user a way to learn the logon name of the administrator who created the account.

RESOLUTION

Windows 2000

To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
260910 How to Obtain the Latest Windows 2000 Service Pack
The English version of this fix should have the following file attributes or later:
   Date      Time    Version        Size     File name
   ----------------------------------------------------
   07/24/00  4:07PM  5.0.2195.2103  699,664  Dnsmgr.dll
				

Windows NT 4.0

To resolve this problem, obtain the Windows NT 4.0 Security Rollup Package. For additional information, click the article number below to view the article in the Microsoft Knowledge Base:
299444 Post-Windows NT 4.0 Service Pack 6a Security Rollup Package (SRP)
The English version of this fix should have the following file attributes or later:
   Date      Time    Version     Size     File name     Platform
   -------------------------------------------------------------
   07/21/00  8:02PM  4.0.1306.1  137,488  Dnsadmin.exe  Intel
   07/21/00  8:00PM  4.0.1306.1  187,152  Dnsadmin.exe  Alpha
				

Microsoft Windows NT Server version 4.0, Terminal Server Edition

To resolve this problem, obtain the Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package (SRP). For additional information about the SRP, click the article number below to view the article in the Microsoft Knowledge Base:
317636 Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package

WORKAROUND

After you create a zone file in DNS, select the properties for the zone and then change the name of the responsible user to a name other than the administrator on the SOA tab (Windows 2000) or in SOA properties (Windows NT 4.0).

STATUS

Windows 2000

Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article. This problem was first corrected in Windows 2000 Service Pack 2.

Windows NT 4.0

Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Windows NT 4.0.

Properties

Article ID: 268082 - Last Review: October 20, 2013 - Revision: 3.5
APPLIES TO
  • Microsoft Windows NT Server 4.0, Terminal Server Edition
  • Microsoft Windows 2000 Server
  • Microsoft Windows 2000 Advanced Server
  • Microsoft Windows 2000 Professional Edition
  • Microsoft Windows NT Server 4.0 Standard Edition
  • Microsoft Windows NT Server 4.0 Enterprise Edition
  • Microsoft Windows NT Workstation 4.0 Developer Edition
Keywords: 
kbnosurvey kbarchive kbhotfixserver kbqfe kbbug kbfix kbsecurity kbsecvulnerability kbwin2000presp2fix KB268082

Give Feedback

 

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com