PT-2026-40237 · Microsoft · Windows Dns
Published
2026-05-12
·
Updated
2026-05-13
·
CVE-2026-41096
CVSS v3.1
9.8
Critical
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows DNS (affected versions not specified)
Description
A heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network. A heap-based buffer overflow occurs when a program writes more data to a heap-allocated memory block than it can hold, potentially corrupting adjacent memory.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
Heap Based Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Windows Dns