Rapid7 Vulnerability & Exploit Database

Microsoft DNS Server Service Buffer Overflow

Back to Search

Microsoft DNS Server Service Buffer Overflow

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
04/12/2007
Created
07/25/2018
Added
04/27/2007
Modified
02/13/2015

Description

Certain versions of Microsoft Windows are vulnerable to a buffer overflow in the DNS Server Service which could allow an unauthenticated local or remote attacker to execute arbitrary code under SYSTEM level privileges. The vulnerability may be exploited using different types of DCERPC transports, including ncalrpc (local), ncacn_ip_tcp (tcp/ip), and ncacn_np (named pipes).

Solution(s)

  • fix-dcerpc-dnssrv-no-patch-exists
  • fix-dcerpc-dnssrv-disable-rpc

References

  • fix-dcerpc-dnssrv-no-patch-exists
  • fix-dcerpc-dnssrv-disable-rpc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;