First published: Fri Apr 13 2007(Updated: )
Stack-based buffer overflow in the RPC interface in the Domain Name System (DNS) Server Service in Microsoft Windows 2000 Server SP 4, Server 2003 SP 1, and Server 2003 SP 2 allows remote attackers to execute arbitrary code via a long zone name containing character constants represented by escape sequences.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows Server 2003 | =sp2 | |
Microsoft Windows Server 2003 | =sp1 | |
Microsoft Windows Server 2003 | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1748 is classified as having a critical severity level due to its potential for remote code execution.
To fix CVE-2007-1748, you should apply the relevant security patches released by Microsoft for the affected versions of Windows.
CVE-2007-1748 affects Microsoft Windows 2000 Server SP4 and all versions of Windows 2003 Server SP1 and SP2.
CVE-2007-1748 is a stack-based buffer overflow vulnerability found in the RPC interface of the DNS Server Service.
Yes, CVE-2007-1748 can be exploited remotely by attackers through crafted zone names sent to the DNS Server.