vendor:
dnslint.exe
by:
John Page (aka hyp3rlinx)
8.8
CVSS
HIGH
Forced Drive-by Download
N/A
CWE
Product Name: dnslint.exe
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Windows
2018
Microsoft dnslint.exe Forced Drive-by Download
The tool doesn't verify domain names when parsing DNS text-files using the "/ql" switch making it prone to forced drive-by downloads, providing an end user is tricked into using a server text-file containing a script/binary reference instead of a normally expected domain name. This potentially allows forced downloading of a remote executable to end users host when the report is veiwed in a web browser.
Mitigation:
Microsoft has not released a patch for this vulnerability.