[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security]  CVE request: no-ip DUC buffer overflow
From:       Raphael Geissert <atomo64+debian () gmail ! com>
Date:       2008-11-21 3:20:17
Message-ID: gg59ds$gs5$3 () ger ! gmane ! org
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,

A buffer overflow has been found in no-ip DUC which can be used to execute code
in the client. The attack relies on DNS poisoning or man in the middle attacks
to fake the server's response.

Original source of information: http://www.milw0rm.com/exploits/7151
More/detailed information: http://bugs.debian.org/506179

Thanks in advance.

Cheers,
- -- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkmKPEACgkQYy49rUbZzlq4twCgirM5MAejW9PU9hbdsPPgD6k7
gu4AmQHCTd9WJ0pJEa86ziEEE+g0kxo8
=YBkb
-----END PGP SIGNATURE-----

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic