oss-sec mailing list archives
CVE request: no-ip DUC buffer overflow
From: Raphael Geissert <atomo64+debian () gmail com>
Date: Thu, 20 Nov 2008 21:20:17 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, A buffer overflow has been found in no-ip DUC which can be used to execute code in the client. The attack relies on DNS poisoning or man in the middle attacks to fake the server's response. Original source of information: http://www.milw0rm.com/exploits/7151 More/detailed information: http://bugs.debian.org/506179 Thanks in advance. Cheers, - -- Raphael Geissert - Debian Maintainer www.debian.org - get.debian.net -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkkmKPEACgkQYy49rUbZzlq4twCgirM5MAejW9PU9hbdsPPgD6k7 gu4AmQHCTd9WJ0pJEa86ziEEE+g0kxo8 =YBkb -----END PGP SIGNATURE-----
Current thread:
- CVE request: no-ip DUC buffer overflow Raphael Geissert (Nov 20)
- Re: CVE request: no-ip DUC buffer overflow Steven M. Christey (Dec 01)