Description
DNSS Domain Name Search Software 2.1.8 contains a buffer overflow vulnerability in the registration code input field that allows local attackers to crash the application by submitting an excessively long string. Attackers can trigger a denial of service by pasting a malicious registration code containing 300 repeated characters into the Name/Key field via the Register menu option.
Published: 2026-03-22
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Patch
AI Analysis

Impact

The vulnerability is a buffer overflow that occurs when a user enters an overly long registration code into the Name/Key field. By pasting a string of 300 or more repeated characters, a local attacker can cause the DNSS Domain Name Search Software to crash, denying legitimate users access to the application. This weakness is identified as a classic buffer overflow (CWE‑787).

Affected Systems

Vendors affected are NSA Auditor, specifically the DNSS Domain Name Search Software version 2.1.8. Users running this version should verify that they are not operating an unpatched instance of the application.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity. Exploitation requires local access, so the risk is limited to users on the affected machine who can invoke the Register menu. Since there is no publicly available EPSS score and the vulnerability is not in the CISA KEV catalog, immediate exploitation likelihood is modest, yet an attacker with local privileges can fully disrupt availability by causing a crash.

Generated by OpenCVE AI on March 22, 2026 at 14:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the installed version of DNSS Domain Name Search Software to confirm it is 2.1.8 or earlier.
  • Visit the vendor website or contact NSA Auditor support to obtain a patch, update, or newer version that resolves the buffer overflow.
  • If no update is available, uninstall the vulnerable software or disable the registration functionality until a fix can be applied.
  • Restart the system or the application after applying any change to ensure the crash condition is no longer exploitable.

Generated by OpenCVE AI on March 22, 2026 at 14:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Nsasoft
Nsasoft nsauditor Dnss Domain Name Search Software
Vendors & Products Nsasoft
Nsasoft nsauditor Dnss Domain Name Search Software

Sun, 22 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description DNSS Domain Name Search Software 2.1.8 contains a buffer overflow vulnerability in the registration code input field that allows local attackers to crash the application by submitting an excessively long string. Attackers can trigger a denial of service by pasting a malicious registration code containing 300 repeated characters into the Name/Key field via the Register menu option.
Title DNSS Domain Name Search Software 2.1.8 Denial of Service
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Nsasoft Nsauditor Dnss Domain Name Search Software
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-24T14:38:35.595Z

Reserved: 2026-03-22T12:50:59.715Z

Link: CVE-2019-25591

cve-icon Vulnrichment

Updated: 2026-03-24T14:38:31.771Z

cve-icon NVD

Status : Deferred

Published: 2026-03-22T14:16:25.633

Modified: 2026-04-16T16:19:50.757

Link: CVE-2019-25591

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:46:25Z

Weaknesses