CVE-2020-37119
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
Nsauditor 3.0.28 and 3.2.1.0 contains a buffer overflow vulnerability in the DNS Lookup tool that allows attackers to execute arbitrary code by overwriting memory. Attackers can craft a malicious DNS query payload to trigger a three-byte overwrite, bypass ASLR, and execute shellcode through a carefully constructed exploit.
Analysis
Stack-based buffer overflow in Nsauditor Network Auditing Tool 3.0.28 and 3.2.1.0 in the DNS Lookup tool allows attackers to execute arbitrary code via crafted input. PoC available.
Technical Context
CWE-121 stack overflow in Nsauditor's DNS Lookup tool. Oversized input to the DNS query field overwrites the stack frame, enabling control of the instruction pointer.
Affected Products
['Nsauditor 3.0.28', 'Nsauditor 3.2.1.0']
Remediation
Update Nsauditor to a patched version. Validate input length in DNS lookup fields.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today