Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/33933 | vdb entry |
http://osvdb.org/35439 | vdb entry |
http://lists.grok.org.uk/pipermail/full-disclosure/2007-April/054024.html | mailing list |
http://securityreason.com/securityalert/2658 | third party advisory |
http://www.securityfocus.com/bid/23694 | vdb entry |
http://www.debian.org/security/2007/dsa-1434 | vendor advisory |
http://secunia.com/advisories/25007 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2007/1561 | vdb entry |
http://www.digit-labs.org/files/exploits/mydns-rr-smash.c | exploit |
http://osvdb.org/35438 | vdb entry |
http://secunia.com/advisories/28086 | third party advisory |
http://www.digit-labs.org/files/patches/mydns-update.c.diff |