Impact
The vulnerability is a buffer overflow that occurs when a user enters an overly long registration code into the Name/Key field. By pasting a string of 300 or more repeated characters, a local attacker can cause the DNSS Domain Name Search Software to crash, denying legitimate users access to the application. This weakness is identified as a classic buffer overflow (CWE‑787).
Affected Systems
Vendors affected are NSA Auditor, specifically the DNSS Domain Name Search Software version 2.1.8. Users running this version should verify that they are not operating an unpatched instance of the application.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity. Exploitation requires local access, so the risk is limited to users on the affected machine who can invoke the Register menu. Since there is no publicly available EPSS score and the vulnerability is not in the CISA KEV catalog, immediate exploitation likelihood is modest, yet an attacker with local privileges can fully disrupt availability by causing a crash.
OpenCVE Enrichment