Full title: haneWIN DNS Server 1.5.3 Buffer Overflow Exploit Category: remote exploits Platform: windows This Metasploit module exploits a buffer overflow vulnerability found in haneWIN DNS Server versions 1.5.3 and below. The vulnerability is triggered by sending an overly long packet to the victim server. A memcpy function blindly copies user supplied data to a fixed size buffer leading to remote code execution. This Metasploit module was tested against haneWIN DNS 1.5.3. # 0day.today @ http://0day.today/