Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
Stack-based buffer overflow in the RPC interface in the Domain Name System (DNS) Server Service in Microsoft Windows 2000 Server SP 4, Server 2003 SP 1, and Server 2003 SP 2 allows remote attackers to execute arbitrary code via a long zone name containing character constants represented by escape sequences.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Microsoft Windows DNS服务器RPC接口远程栈溢出漏洞
Vulnerability Description
Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。 Microsoft Windows DNS服务器的RPC接口在处理畸形请求时存在栈溢出漏洞。Lookup_ZoneTreeNodeFromDottedName()函数使用固定的本地缓冲区转换Name_ConvertFileNameToCountName()字符串,该字符串中可能包含有反斜线八进制字符。尽管在写入缓冲区时执行了一些边界检查,但攻击者可以使用包含有多个反斜线字符的字符串绕过检查,导致栈溢出。
CVSS Information
N/A
Vulnerability Type
N/A