- ------------------------------------------------------------------------Debian Security Advisory DSA-1686-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
December 14, 2008                     http://www.debian.org/security/faq
- ------------------------------------------------------------------------Package        : no-ip
Vulnerability  : buffer overflow
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2008-5297
Debian Bug     : 506179

A buffer overflow has been discovered in the HTTP parser of the No-IP.com
Dynamic DNS update client, which may result in the execution of arbitrary
code.

For the stable distribution (etch), this problem has been fixed in
version 2.1.1-4+etch1.

For the upcoming stable distribution (lenny) and the unstable distribution
(sid), this problem has been fixed in version 2.1.7-11.

We recommend that you upgrade your no-ip package.

Upgrade instructions
- --------------------wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

      Size/MD5 checksum:     5099 991539fbaabc7808f1e6540e6d2a7d37
      Size/MD5 checksum:    70553 a743fcd40699596d25347083eca86d52
      Size/MD5 checksum:      573 a46cc0befc6409b256e76abceec2bba8

alpha architecture (DEC Alpha)

      Size/MD5 checksum:    25552 72ada61d338c9ca7ccf22de55168de1b

amd64 architecture (AMD x86_64 (AMD64))

      Size/MD5 checksum:    22740 eea473fb4410d7b7953150139378b56c

arm architecture (ARM)

      Size/MD5 checksum:    21486 eb86554f2e2b20c382810bcfce21ac96

hppa architecture (HP PA RISC)

      Size/MD5 checksum:    23778 7212e0f6ef1b749de5531ff279fe63d1

i386 architecture (Intel ia32)

      Size/MD5 checksum:    20838 44598c7737861f61e7c6f012c65228f7

ia64 architecture (Intel ia64)

      Size/MD5 checksum:    30888 ba8e62cc6fe5bf70631710b699adb9da

mips architecture (MIPS (Big Endian))

      Size/MD5 checksum:    23936 f3d9215b718a083354e9b9426577aafb

mipsel architecture (MIPS (Little Endian))

      Size/MD5 checksum:    23854 69f6d783ff8345c565910877e2db4909

powerpc architecture (PowerPC)

      Size/MD5 checksum:    22514 550fe870f5d0cb85e2ab96c510d70127

s390 architecture (IBM S/390)

      Size/MD5 checksum:    22842 37f9132b2f6aae1a828405ae701a325c

sparc architecture (Sun SPARC/UltraSPARC)

      Size/MD5 checksum:    21020 191248685382bb6051853bba9081f012


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Debian: New no-ip packages fix arbitrary code execution

December 14, 2008
A buffer overflow has been discovered in the HTTP parser of the No-IP.com Dynamic DNS update client, which may result in the execution of arbitrary code.

Summary

Severity

Related News