Computer Security
[EN] securityvulns.ru no-pyccku


No-IP.com DDNS client for Unix/Linux buffer overflow
Published:15.12.2008
Source:
SecurityVulns ID:9516
Type:client
Threat Level:
5/10
Description:Buffer overflow on HTTP response parsing.
Affected:NOIP : No-IP DUC 2.1
CVE:CVE-2008-5297 (Buffer overflow in No-IP DUC 2.1.7 and earlier allows remote HTTP servers to execute arbitrary code via a crafted response to a DNS update request, related to a missing length check in the GetNextLine function.)
Original documentdocumentDEBIAN, [SECURITY] [DSA 1686-1] New no-ip packages fix arbitrary code execution (15.12.2008)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod