haneWIN DNS Server 1.5.3 Buffer Overflow
Posted by deepcore on September 15, 2017 – 8:54 am
This Metasploit module exploits a buffer overflow vulnerability found in haneWIN DNS Server versions 1.5.3 and below. The vulnerability is triggered by sending an overly long packet to the victim server. A memcpy function blindly copies user supplied data to a fixed size buffer leading to remote code execution. This Metasploit module was tested against haneWIN DNS 1.5.3.
Post a reply
You must be logged in to post a comment.