header-logo
Suggest Exploit
vendor:
Dual DHCP DNS Server
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Dual DHCP DNS Server
Affected Version From: 1
Affected Version To: 1
Patch Exists: Yes
Related CWE: N/A
CPE: a:dhcp-dns-server:dual_dhcp_dns_server
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

Dual DHCP DNS Server Remote Buffer Overflow Vulnerability

Dual DHCP DNS Server is prone to a remote buffer overflow vulnerability. The vulnerability presents itself when the server handles excessive data through the DHCP options field. Successful exploitation can allow attackers to trigger a denial of service condition or execute arbitrary code to gain unauthorized remote access in the context of the affected server.

Mitigation:

Users should upgrade to the latest version of Dual DHCP DNS Server.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/16298/info

Dual DHCP DNS Server is prone to a remote buffer overflow vulnerability.

The vulnerability presents itself when the server handles excessive data through the DHCP options field.

Successful exploitation can allow attackers to trigger a denial of service condition or execute arbitrary code to gain unauthorized remote access in the context of the affected server.

Dual DHCP DNS Server 1.0 is reported to be affected. 

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27108.zip