Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:  Thu, 20 Nov 2008 21:20:17 -0600
From:  Raphael Geissert <atomo64+debian@...il.com>
To: oss-security@...ts.openwall.com
Subject:  CVE request: no-ip DUC buffer overflow

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello,

A buffer overflow has been found in no-ip DUC which can be used to execute code
in the client. The attack relies on DNS poisoning or man in the middle attacks
to fake the server's response.

Original source of information: http://www.milw0rm.com/exploits/7151
More/detailed information: http://bugs.debian.org/506179

Thanks in advance.

Cheers,
- -- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkmKPEACgkQYy49rUbZzlq4twCgirM5MAejW9PU9hbdsPPgD6k7
gu4AmQHCTd9WJ0pJEa86ziEEE+g0kxo8
=YBkb
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.