oss-sec mailing list archives

CVE request: no-ip DUC buffer overflow


From: Raphael Geissert <atomo64+debian () gmail com>
Date: Thu, 20 Nov 2008 21:20:17 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,

A buffer overflow has been found in no-ip DUC which can be used to execute code
in the client. The attack relies on DNS poisoning or man in the middle attacks
to fake the server's response.

Original source of information: http://www.milw0rm.com/exploits/7151
More/detailed information: http://bugs.debian.org/506179

Thanks in advance.

Cheers,
- -- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkmKPEACgkQYy49rUbZzlq4twCgirM5MAejW9PU9hbdsPPgD6k7
gu4AmQHCTd9WJ0pJEa86ziEEE+g0kxo8
=YBkb
-----END PGP SIGNATURE-----


Current thread: