Some attacks have been spotted in the wild that exploit a new vulnerability in its Domain Name Server Service. Microsoft’s Windows Animated Cursor Handling bug lets remote attackers run arbitrary code on the victim’s machine. The software giant has since issued a patch for the bug, which also affects Vista. Users should disable remote management over RPC for the DNS server using a registry-key setting; block inbound (and unsolicited) traffic on ports 1024-5000 with IPSec or a firewall; and turn on the advanced TCP/IP filtering options.”]
Source: https://www.darkreading.com/analytics/zero-day-fever

