[Secure-testing-team] Bug#506942: Buffer overflow exploit in versions until 2.1.8

martin f krafft madduck at debian.org
Wed Nov 26 08:50:16 UTC 2008


Package: no-ip
Version: 2.1.1-4
Severity: critical
Tags: security, fixed-upstream

I just received the attached message from No-IP.com. This affects
stable and testing.

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.26-1-amd64 (SMP w/1 CPU core)
Locale: LANG=en_GB, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash


-- 
 .''`.   martin f. krafft <madduck at debian.org>
: :'  :  proud Debian developer, author, administrator, and user
`. `'`   http://people.debian.org/~madduck - http://debiansystem.info
  `-  Debian - when you have better things to do than fixing systems
-------------- next part --------------
An embedded message was scrubbed...
From: "No-IP Security Alert" <noreply-3189082 at no-ip.com>
Subject: Important No-IP Linux Update Client Security Update
Date: Mon, 24 Nov 2008 17:05:35 -0800 (PST)
Size: 4650
Url: http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20081126/26f7dd93/attachment.eml 
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: Digital signature (see http://martin-krafft.net/gpg/)
Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20081126/26f7dd93/attachment.pgp 


More information about the Secure-testing-team mailing list