*** This bug is a security vulnerability *** Public security bug reported:
Binary package hint: noip2 Please upgrade package to 2.1.9. I received the following email from no- ip.com on 11/24/2008: No-IP has determined that the following advisory is applicable to one or more of the systems you have registered. Security Advisory - 2008-11-22 ------------------------------------------------------------------------------ Summary: Important: No-IP Linux DUC (Dynamic Update Client) An updated version of the No-IP Linux Dynamic Update Client that fixes a security issue is now available. This update has been rated as having important security impact. Description: Versions 2.1.1- > 2.1.8 are prone to a stack-based buffer-overflow due to a boundary error when processing HTTP responses received from the update server. This can be exploited and cause a stack-based buffer overflow when performing an update. A malicious user could exploit this by faking the No-IP update server via DNS poisoning or a man in the middle attack. This can cause a denial of service (client crash) or potentially execute arbitrary code on the computer the client is running on. Users running versions 2.1.8 and older are encouraged to upgrade to the most recent version, 2.1.9 at http://www.no-ip.com/downloads?page=linux&av=1 Regards, The No-IP Team ** Affects: no-ip (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public -- noip2 security vulnerability <= 2.1.8 https://bugs.launchpad.net/bugs/305922 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs