Impact
Nsauditor 3.0.28.0 includes a structured exception handling buffer overflow in its DNS Lookup tool. By providing a crafted DNS Query that overwrites the SEH chain, a local attacker can inject shellcode and execute arbitrary code with the privileges of the application. This vulnerability is a classic memory corruption flaw categorized as CWE‑787, allowing an attacker to take control of the program flow once the payload is executed.
Affected Systems
The affected product is Nsauditor, specifically the DNS Lookup component of version 3.0.28.0. The flaw is local in nature, meaning attackers must have access to the system running the application to supply malicious input and trigger the buffer overflow.
Risk and Exploitability
With a CVSS score of 8.6, the flaw is considered high severity. The exploit requires local access, yet it can lead to full code execution at application level and potentially beyond. No exploit probability metric is available, and the vulnerability is not listed in CISA’s KEV catalog. Attackers can achieve exploitation by simply running a malicious DNS Query within the tool, making the attack straightforward for those with local privileges.
OpenCVE Enrichment