haneWIN DNS Server 1.5.3 Buffer Overflow

Discussion in 'News Aggregator' started by Packet Storm, 15 Sep 2017.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits a buffer overflow vulnerability found in haneWIN DNS Server versions 1.5.3 and below. The vulnerability is triggered by sending an overly long packet to the victim server. A memcpy function blindly copies user supplied data to a fixed size buffer leading to remote code execution. This Metasploit module was tested against haneWIN DNS 1.5.3.

    Continue reading...
     

Share This Page

Loading...