Summary
This host is running haneWIN DNS server and is prone to denial of service vulnerability.
Impact
Successful exploitation will allow remote attacker to cause a denial of service.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaw is due to an error when handling specially crafted requests which can be exploited to crash the server.
Affected
haneWIN DNS Server version 1.5.3
Detection
Send crafted request and check is it vulnerable to DoS or not.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- BreakPoint Software Hex Workshop Denial of Service vulnerability
- ClamAV get_unicode_name() Off-By-One Heap based BOF Vulnerability
- Colasoft Capsa Malformed SNMP V1 Packet Remote Denial of Service Vulnerability
- FreeSSHd Remote Denial of Service Vulnerability
- Active Perl Denial of Service Vulnerability (Windows)