Description
Buffer overflow in No-IP DUC 2.1.7 and earlier allows remote HTTP servers to execute arbitrary code via a crafted response to a DNS update request, related to a missing length check in the GetNextLine function.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1686-1 | New no-ip packages fix arbitrary code execution |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T10:49:12.424Z
Reserved: 2008-12-01T00:00:00.000Z
Link: CVE-2008-5297
No data.
Status : Modified
Published: 2008-12-01T15:30:03.843
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-5297
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA