CVE-2008-5297

Buffer overflow in No-IP DUC 2.1.7 and earlier allows remote HTTP servers to execute arbitrary code via a crafted response to a DNS update request, related to a missing length check in the GetNextLine function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vitalwerks:no-ip_duc:*:*:*:*:*:*:*:*
cpe:2.3:a:vitalwerks:no-ip_duc:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vitalwerks:no-ip_duc:2.1:*:*:*:*:*:*:*
cpe:2.3:a:vitalwerks:no-ip_duc:2.1.5:*:*:*:*:*:*:*

History

07 Nov 2023, 02:03

Type Values Removed Values Added
References
  • {'url': 'http://git.debian.org/?p=collab-maint/no-ip.git;a=commit;h=60ed93621ff36d9731ba5d9f9336d6eb91122302', 'name': 'http://git.debian.org/?p=collab-maint/no-ip.git;a=commit;h=60ed93621ff36d9731ba5d9f9336d6eb91122302', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://git.debian.org/?p=collab-maint/no-ip.git%3Ba=commit%3Bh=60ed93621ff36d9731ba5d9f9336d6eb91122302 -

Information

Published : 2008-12-01 15:30

Updated : 2024-02-28 11:21


NVD link : CVE-2008-5297

Mitre link : CVE-2008-5297

CVE.ORG link : CVE-2008-5297


JSON object : View

Products Affected

vitalwerks

  • no-ip_duc
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer