Описание
Buffer overflow in No-IP DUC 2.1.7 and earlier allows remote HTTP servers to execute arbitrary code via a crafted response to a DNS update request, related to a missing length check in the GetNextLine function.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.1.1-4+etch1build0.6.06.1 |
devel | not-affected | 2.1.7-11 |
gutsy | ignored | end of life, was needed |
hardy | ignored | end of life |
intrepid | ignored | end of life, was needed |
jaunty | not-affected | 2.1.7-11 |
karmic | not-affected | 2.1.7-11 |
lucid | not-affected | 2.1.7-11 |
maverick | not-affected | 2.1.7-11 |
natty | not-affected | 2.1.7-11 |
Показывать по
Ссылки на источники
EPSS
7.6 High
CVSS2
Связанные уязвимости
Buffer overflow in No-IP DUC 2.1.7 and earlier allows remote HTTP servers to execute arbitrary code via a crafted response to a DNS update request, related to a missing length check in the GetNextLine function.
Buffer overflow in No-IP DUC 2.1.7 and earlier allows remote HTTP serv ...
Buffer overflow in No-IP DUC 2.1.7 and earlier allows remote HTTP servers to execute arbitrary code via a crafted response to a DNS update request, related to a missing length check in the GetNextLine function.
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS
7.6 High
CVSS2