Vulnerability Name:

CVE-2007-1748 (CCN-33629)

Assigned:2007-04-12
Published:2007-04-12
Updated:2019-04-30
Summary:Stack-based buffer overflow in the RPC interface in the Domain Name System (DNS) Server Service in Microsoft Windows 2000 Server SP 4, Server 2003 SP 1, and Server 2003 SP 2 allows remote attackers to execute arbitrary code via a long zone name containing character constants represented by escape sequences.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
8.3 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Microsoft Security Response Center Blog, Thursday, April 12, 2007 8:56 PM
Microsoft Security Advisory 935964 Posted

Source: MISC
Type: UNKNOWN
http://blogs.technet.com/msrc/archive/2007/04/12/microsoft-security-advisory-935964-posted.aspx

Source: MITRE
Type: CNA
CVE-2007-1748

Source: MISC
Type: UNKNOWN
http://metasploit.com/svn/framework3/trunk/modules/exploits/windows/dcerpc/msdns_zonename.rb

Source: CCN
Type: SA24871
Microsoft Windows DNS Service Buffer Overflow Vulnerability

Source: SECUNIA
Type: Vendor Advisory
24871

Source: CCN
Type: SECTRACK ID: 1017910
Microsoft Windows DNS Service RPC Stack Overflow Lets Remote Users Execute Arbitrary Code

Source: CCN
Type: ASA-2007-188
MS07-029 Vulnerability in RPC on Windows DNS Server Could Allow Remote Code Execution (935966)

Source: CCN
Type: Microsoft Knowledge Base Article 935964
Microsoft Security Advisory: A vulnerability in RPC in the Windows DNS Server service could allow remote code execution

Source: CCN
Type: US-CERT VU#555920
Microsoft Windows DNS RPC buffer overflow

Source: CERT-VN
Type: US Government Resource
VU#555920

Source: CCN
Type: Microsoft Security Advisory (935964)
Vulnerability in RPC on Windows DNS Server Could Allow Remote Code Execution.

Source: CONFIRM
Type: Vendor Advisory
http://www.microsoft.com/technet/security/advisory/935964.mspx

Source: CCN
Type: Microsoft Security Bulletin MS07-029
Vulnerability in Windows DNS RPC Interface Could Allow Remote Code Execution (935966)

Source: BUGTRAQ
Type: UNKNOWN
20070415 Re: [exploits] RPC vuln in DNS Server (fwd)

Source: HP
Type: UNKNOWN
HPSBST02214

Source: BID
Type: UNKNOWN
23470

Source: CCN
Type: BID-23470
Microsoft Windows DNS Server Escaped Zone Name Parameter Buffer Overflow Vulnerability

Source: SECTRACK
Type: UNKNOWN
1017910

Source: CERT
Type: US Government Resource
TA07-103A

Source: CERT
Type: US Government Resource
TA07-128A

Source: VUPEN
Type: Vendor Advisory
ADV-2007-1366

Source: MS
Type: UNKNOWN
MS07-029

Source: XF
Type: UNKNOWN
win-dns-rpc-bo(33629)

Source: XF
Type: UNKNOWN
win-dns-rpc-bo(33629)

Source: CCN
Type: NMAP Web site
File smb-vuln-ms07-029

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1228

Source: CCN
Type: Rapid7 Vulnerability and Exploit Database [04-12-2007]
MS07-029 Microsoft DNS RPC Service extractQuotedChar() Overflow (TCP)

Source: CCN
Type: Rapid7 Vulnerability and Exploit Database [04-12-2007]
MS07-029 Microsoft DNS RPC Service extractQuotedChar() Overflow (SMB)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:sp1:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:sp1:*:itanium:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:sp1:*:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:sp2:*:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:sp2:*:itanium:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:sp2:*:x64:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:microsoft:windows_2000::sp4:server:*:*:*:*:*
  • OR cpe:/o:microsoft:windows_2003_server:-:sp1:x64:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:2003_server:sp1_itanium:*:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:*:*
  • OR cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:itanium:*
  • OR cpe:/o:microsoft:windows:server_2003:*:sp2:*:*:*:x64:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:1228
    V
    DNS RPC Management Vulnerability
    2011-05-16
    BACK
    microsoft windows 2000 * sp4
    microsoft windows 2003 server sp1
    microsoft windows 2003 server sp1
    microsoft windows 2003 server sp1
    microsoft windows 2003 server sp2
    microsoft windows 2003 server sp2
    microsoft windows 2003 server sp2
    microsoft windows 2000 sp4
    microsoft windows 2003 server - sp1
    microsoft windows 2003_server sp1
    microsoft windows 2003_server sp1_itanium
    microsoft windows server_2003
    microsoft windows server_2003
    microsoft windows server_2003