Source: no-ip
Severity: grave
Version: 2.1.1-4
Tags: security

Hi,

An exploit[1] has been published for the no-ip DUC.

At the moment there's no much other information than the one provided in the 
exploit, which I can summarise as:

The exploit relies on DNS poisoning or man in the middle attacks to fake the 
server's response.
Once this has been done the exploit waits for an IP check, to then prepare the 
shellcode to send which is requires the knowledge of the memory offset of the 
buffer which must of course be static and determined for each build. 
After the client receives a faked IP to force a update the exploit delivers 
the shellcode, which is executed because of a buffer overflow when processing 
the server's response.

If you fix the vulnerability please also make sure to include the CVE id when 
one is assigned in the changelog entry.

[1]http://www.milw0rm.com/exploits/7151

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to