CVE-2008-5297

Buffer overflow in No-IP DUC 2.1.7 and earlier allows remote HTTP servers to execute arbitrary code via a crafted response to a DNS update request, related to a missing length check in the GetNextLine function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:vitalwerks:no-ip_duc:*:*:*:*:*:*:*:*
cpe:2.3:a:vitalwerks:no-ip_duc:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:vitalwerks:no-ip_duc:2.1:*:*:*:*:*:*:*
cpe:2.3:a:vitalwerks:no-ip_duc:2.1.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:53

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506179 - () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506179 -
References () http://git.debian.org/?p=collab-maint/no-ip.git%3Ba=commit%3Bh=60ed93621ff36d9731ba5d9f9336d6eb91122302 - () http://git.debian.org/?p=collab-maint/no-ip.git%3Ba=commit%3Bh=60ed93621ff36d9731ba5d9f9336d6eb91122302 -
References () http://secunia.com/advisories/32761 - () http://secunia.com/advisories/32761 -
References () http://secunia.com/advisories/33138 - () http://secunia.com/advisories/33138 -
References () http://secunia.com/advisories/33610 - () http://secunia.com/advisories/33610 -
References () http://security.gentoo.org/glsa/glsa-200901-12.xml - () http://security.gentoo.org/glsa/glsa-200901-12.xml -
References () http://securityreason.com/securityalert/4672 - () http://securityreason.com/securityalert/4672 -
References () http://www.debian.org/security/2008/dsa-1686 - () http://www.debian.org/security/2008/dsa-1686 -
References () http://www.openwall.com/lists/oss-security/2008/11/21/15 - () http://www.openwall.com/lists/oss-security/2008/11/21/15 -
References () http://www.securityfocus.com/bid/32344 - () http://www.securityfocus.com/bid/32344 -
References () http://xenomuta.tuxfamily.org/exploits/noIPwn3r.c - Exploit () http://xenomuta.tuxfamily.org/exploits/noIPwn3r.c - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46696 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46696 -
References () https://www.exploit-db.com/exploits/7151 - () https://www.exploit-db.com/exploits/7151 -

07 Nov 2023, 02:03

Type Values Removed Values Added
References
  • {'url': 'http://git.debian.org/?p=collab-maint/no-ip.git;a=commit;h=60ed93621ff36d9731ba5d9f9336d6eb91122302', 'name': 'http://git.debian.org/?p=collab-maint/no-ip.git;a=commit;h=60ed93621ff36d9731ba5d9f9336d6eb91122302', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://git.debian.org/?p=collab-maint/no-ip.git%3Ba=commit%3Bh=60ed93621ff36d9731ba5d9f9336d6eb91122302 -

Information

Published : 2008-12-01 15:30

Updated : 2024-11-21 00:53


NVD link : CVE-2008-5297

Mitre link : CVE-2008-5297

CVE.ORG link : CVE-2008-5297


JSON object : View

Products Affected

vitalwerks

  • no-ip_duc
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer