|    |    |    | Today: 21-Sep-2019 |

haneWIN DNS Server 1.5.3 Buffer Overflow

November 1, 2017 | Posted in ExploitAlert

This Metasploit module exploits a buffer overflow vulnerability found in haneWIN DNS Server versions 1.5.3 and below. The vulnerability is triggered by sending an overly long packet to the victim server. A memcpy function blindly copies user supplied data to a fixed size buffer leading to remote code execution. This Metasploit module was tested against haneWIN DNS 1.5.3.


Source: haneWIN DNS Server 1.5.3 Buffer Overflow

Taged in: Exploit