Companies that haven't applied the workarounds for the Microsoft DNS server flaw yet need to make it their top priority. This is NOT something that can wait for a planned weekly or monthly outage; the workarounds need to be applied immediately because of what's at stake. There is already evidence of worm and malware activity probing for this vulnerability because of the value of hacking a Microsoft DNS server, especially the internal DNS, which is usually Active Directory integrated. This can lead to every single computer in your company being silently infected with backdoors and rootkits.
In most enterprise networks, Active Directory is the dominant user directory system in place. The internal DNS server is usually integrated into the Active Directory, and it's often hosted directly on the Active Directory Domain Controller. Even when it's not on the Domain Controller, it's a member server that's managed using Domain Administrator credentials. If that DNS server is not hardened against this latest exploit and it gets compromised, the attacker has full control of that computer and can try to obtain the Domain Administrator credentials through various means. Once the attacker is successful, they can transparently assign software to every member server and client computer in the Active Directory to install any kind of software silently. That means malware can be planted into virtually every computer in the company without any user interaction or knowledge of what evil deeds are transpiring. This isn't intended to be alarmist, but it's important to understand the severity of this issue.
Many people may be under the wrong assumption that this is a DNS attack and that it's someone else's problem because they have perimeter firewalls in place. That isn't the case. All it takes is a single computer to be compromised within the perimeter to compromise the internal DNS server through RPC if the hardening measures have not been taken. The workarounds are simple and effective, but you MUST implement one of the following solutions:
To verify your work, you should test to confirm if you're prevented from managing the DNS server from unauthorized IP addresses if you used the second method. Remote management should always fail if you used the first method. Some of this is a rehash of what I wrote last week, but I wanted to clarify and emphasize how important this issue is.