Source: no-ip Severity: grave Version: 2.1.1-4 Tags: security Hi,
An exploit[1] has been published for the no-ip DUC. At the moment there's no much other information than the one provided in the exploit, which I can summarise as: The exploit relies on DNS poisoning or man in the middle attacks to fake the server's response. Once this has been done the exploit waits for an IP check, to then prepare the shellcode to send which is requires the knowledge of the memory offset of the buffer which must of course be static and determined for each build. After the client receives a faked IP to force a update the exploit delivers the shellcode, which is executed because of a buffer overflow when processing the server's response. If you fix the vulnerability please also make sure to include the CVE id when one is assigned in the changelog entry. [1]http://www.milw0rm.com/exploits/7151 Cheers, -- Raphael Geissert - Debian Maintainer www.debian.org - get.debian.net
signature.asc
Description: This is a digitally signed message part.