CVE-2020-37197
Published: 11 February 2026
Summary
CVE-2020-37197 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Nsasoft Domain Name Search Software. Its CVSS base score is 7.5 (High).
Operationally, ranked at the 2.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Platform-independent managed code eliminates the need for unchecked native buffer copies that are the root cause of classic buffer overflows.
NVD Description
Dnss Domain Name Search Software contains a denial of service vulnerability that allows attackers to crash the application by overflowing the 'Name' input field. Attackers can generate a 1000-character buffer payload and paste it into the registration name field to…
more
trigger an application crash.
Deeper analysisAI
CVE-2020-37197 is a denial-of-service vulnerability in Dnss Domain Name Search Software, stemming from a buffer overflow in the 'Name' input field. Attackers can overflow this field, specifically the registration name field, by submitting a 1000-character payload, causing the application to crash. The vulnerability is classified under CWE-120 (Buffer Copy without Checking Size of Input) and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity primarily due to availability impact.
Remote attackers require no privileges or user interaction to exploit this issue over the network with low complexity. By generating and pasting a 1000-character buffer payload into the registration name field, they can reliably trigger an application crash, resulting in a denial of service that disrupts the software's functionality.
Advisories and related resources, including those from Vulncheck and an Exploit-DB proof-of-concept at https://www.exploit-db.com/exploits/47861, document the vulnerability but do not specify patches or detailed mitigation steps in the available information. Security practitioners should review the references at http://www.nsauditor.com/ and https://www.vulncheck.com/advisories/dnss-domain-name-search-software-name-denial-of-service for any updates on remediation.
Details
- CWE(s)