Date: Thu, 20 Nov 2008 21:20:17 -0600 From: Raphael Geissert <atomo64+debian@...il.com> To: oss-security@...ts.openwall.com Subject: CVE request: no-ip DUC buffer overflow -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, A buffer overflow has been found in no-ip DUC which can be used to execute code in the client. The attack relies on DNS poisoning or man in the middle attacks to fake the server's response. Original source of information: http://www.milw0rm.com/exploits/7151 More/detailed information: http://bugs.debian.org/506179 Thanks in advance. Cheers, - -- Raphael Geissert - Debian Maintainer www.debian.org - get.debian.net -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) iEYEARECAAYFAkkmKPEACgkQYy49rUbZzlq4twCgirM5MAejW9PU9hbdsPPgD6k7 gu4AmQHCTd9WJ0pJEa86ziEEE+g0kxo8 =YBkb -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.