Vulnerability Description
DNSS Domain Name Search Software 2.1.8 contains a buffer overflow vulnerability in the registration code input field that allows local attackers to crash the application by submitting an excessively long string. Attackers can trigger a denial of service by pasting a malicious registration code containing 300 repeated characters into the Name/Key field via the Register menu option.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- http://www.nsauditor.com/downloads/dnss_setup.exe
- https://www.exploit-db.com/exploits/46831
- https://www.vulncheck.com/advisories/dnss-domain-name-search-software-denial-of-
FAQ
What is CVE-2019-25591?
CVE-2019-25591 is a vulnerability with a CVSS score of 6.2 (MEDIUM). DNSS Domain Name Search Software 2.1.8 contains a buffer overflow vulnerability in the registration code input field that allows local attackers to crash the application by submitting an excessively l...
How severe is CVE-2019-25591?
CVE-2019-25591 has been rated MEDIUM with a CVSS base score of 6.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-25591?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.