First published: Fri Apr 13 2007(Updated: )
Stack-based buffer overflow in the RPC interface in the Domain Name System (DNS) Server Service in Microsoft Windows 2000 Server SP 4, Server 2003 SP 1, and Server 2003 SP 2 allows remote attackers to execute arbitrary code via a long zone name containing character constants represented by escape sequences.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2003 Server | =sp2 | |
Microsoft Windows 2003 Server | =sp1 | |
Microsoft Windows 2003 Server | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.