nslookup.exe in Microsoft Windows XP SP2 allows user-assisted remote attackers to execute arbitrary code, as demonstrated by an attempted DNS zone transfer, and as exploited in the wild in August 2008.
References
Configurations
History
21 Nov 2024, 00:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.org/0808-advisories/Nslookup-Crash.txt - | |
References | () http://www.nullcode.com.ar/ncs/crash/nsloo.htm - Exploit | |
References | () http://www.securityfocus.com/bid/30636 - | |
References | () http://www.securitytracker.com/id?1020711 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/44423 - |
Information
Published : 2008-08-12 23:41
Updated : 2024-11-21 00:49
NVD link : CVE-2008-3648
Mitre link : CVE-2008-3648
CVE.ORG link : CVE-2008-3648
JSON object : View
Products Affected
microsoft
- windows_xp
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')