Summary
This host is running haneWIN DNS server and is prone to denial of service vulnerability.
Impact
Successful exploitation will allow remote attacker to cause a denial of service.
Impact Level: Application
Solution
No solution or patch was made available for at least one year since disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
Insight
The flaw is due to an error when handling specially crafted requests which can be exploited to crash the server.
Affected
haneWIN DNS Server version 1.5.3
Detection
Send crafted request and check is it vulnerable to DoS or not.
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 7.8
AV:N/AC:L/Au:N/C:N/I:N/A:C
Related Vulnerabilities
- Asterisk SIP Channel Driver Denial Of Service Vulnerability (Linux)
- Adobe Reader '.ETD File' Denial of Service Vulnerability (Linux)
- Dnsmasq Remote Denial of Service Vulnerability
- Adobe Flash Player/Air Multiple Vulnerabilities - August10 (Win)
- Google Chrome Multiple Denial of Service Vulnerabilities - March12 (Linux)