Support Support Downloads Knowledge Base Juniper Support Portal Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

What is the meaning of "DNS:OVERFLOW:HOSTNAME-OF" ?



Article ID: KB7797 KB Last Updated: 21 Jun 2010Version: 4.0
Deep Inspection (DI) Signature DNS:OVERFLOW:HOSTNAME-OF appears in the event logs




The following is a definition of the "DNS:OVERFLOW:HOSTNAME-OF" DI signature:


A remote code execution vulnerability exists in Internet Explorer because of the way it handles certain URLs. An attacker could exploit the vulnerability by constructing a malicious Web page. This malicious web page could potentially allow remote code execution if a user visited a malicious Web site or viewed a malicious e-mail message. An attacker who successfully exploited the vulnerability could take complete control of an affected system. However, user interaction is required to exploit this vulnerability.


Related Links

Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search