Your message dated Fri, 21 Nov 2008 01:47:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#506179: fixed in no-ip 2.1.7-11
has caused the Debian Bug report #506179,
regarding no-ip: remote code execution vulnerability
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
506179: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506179
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Source: no-ip
Severity: grave
Version: 2.1.1-4
Tags: security

Hi,

An exploit[1] has been published for the no-ip DUC.

At the moment there's no much other information than the one provided in the 
exploit, which I can summarise as:

The exploit relies on DNS poisoning or man in the middle attacks to fake the 
server's response.
Once this has been done the exploit waits for an IP check, to then prepare the 
shellcode to send which is requires the knowledge of the memory offset of the 
buffer which must of course be static and determined for each build. 
After the client receives a faked IP to force a update the exploit delivers 
the shellcode, which is executed because of a buffer overflow when processing 
the server's response.

If you fix the vulnerability please also make sure to include the CVE id when 
one is assigned in the changelog entry.

[1]http://www.milw0rm.com/exploits/7151

Cheers,
-- 
Raphael Geissert - Debian Maintainer
www.debian.org - get.debian.net

Attachment: signature.asc
Description: This is a digitally signed message part.


--- End Message ---
--- Begin Message ---
Source: no-ip
Source-Version: 2.1.7-11

We believe that the bug you reported is fixed in the latest version of
no-ip, which is due to be installed in the Debian FTP archive:

no-ip_2.1.7-11.diff.gz
  to pool/main/n/no-ip/no-ip_2.1.7-11.diff.gz
no-ip_2.1.7-11.dsc
  to pool/main/n/no-ip/no-ip_2.1.7-11.dsc
noip2_2.1.7-11_i386.deb
  to pool/main/n/no-ip/noip2_2.1.7-11_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Andres Mejia <[EMAIL PROTECTED]> (supplier of updated no-ip package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 20 Nov 2008 19:25:31 -0500
Source: no-ip
Binary: noip2
Architecture: source i386
Version: 2.1.7-11
Distribution: unstable
Urgency: high
Maintainer: Otavio Salvador <[EMAIL PROTECTED]>
Changed-By: Andres Mejia <[EMAIL PROTECTED]>
Description: 
 noip2      - client for dynamic DNS service
Closes: 506179
Changes: 
 no-ip (2.1.7-11) unstable; urgency=high
 .
   [ Avi Rozen ]
   * Fixed grave bug: remote code execution vulnerability. (Closes: #506179)
Checksums-Sha1: 
 e5638fbd316614435c4292668b44a5d9faa0e479 1203 no-ip_2.1.7-11.dsc
 850c0be4085e780227d3fb9058b5f4791b9ffd95 20579 no-ip_2.1.7-11.diff.gz
 cd1cab0704ade07afd75688d7170f9cb300f0156 74284 noip2_2.1.7-11_i386.deb
Checksums-Sha256: 
 a9495f5b9d10421b0f554eee4396774cdfa79eaafdffd15d53c4ab39cb2d4cb3 1203 
no-ip_2.1.7-11.dsc
 1714618c7a096e83b43df6d6f126705fa411a93b6adf5e2926445b3c8e712eb1 20579 
no-ip_2.1.7-11.diff.gz
 0150ca40510dea4cf6a5a484ef51774d040da098f857ad5554360d1ac5f8bf7b 74284 
noip2_2.1.7-11_i386.deb
Files: 
 2ec242cee97ce90ce47d96ac13d99208 1203 net optional no-ip_2.1.7-11.dsc
 6a276b86a434503feaaed058d4c3afd9 20579 net optional no-ip_2.1.7-11.diff.gz
 517fb1245e07e3acb120ba96d148d46b 74284 net optional noip2_2.1.7-11_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkkmEa0ACgkQgsFbAuXxMZa0uwCfV5SMR2nhArMLjNEgsYX48K4u
2moAoKL+z+kI8SsM8vi0XbD3oA27iijI
=OBs0
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to