Impact
Nsauditor 3.0.28.0 contains a structured exception handling buffer overflow in its DNS Lookup tool. By supplying a carefully crafted DNS Query that overwrites the SEH chain, a local user can inject shellcode and execute arbitrary code with the application's privileges. This flaw is a classic out‑of‑bounds memory write (CWE‑787) and provides direct code execution to any user who can run the vulnerable program.
Affected Systems
The vulnerability affects the Nsauditor software version 3.0.28.0 from the vendor Nsauditor. No other versions or products are listed as impacted in the available data.
Risk and Exploitability
The CVSS score of 8.6 indicates high severity, but the EPSS score of less than 1 % suggests a low probability of widespread exploitation. The vulnerability is not catalogued in the CISA KEV list. Attackers are limited to individuals with local access who can launch the DNS Lookup tool or a malicious query, as there is no remote trigger documented. Exploit code is available in public exploit databases, confirming the feasibility of local exploitation even if it remains uncommon.
OpenCVE Enrichment