Multiple buffer overflows in Xzabite DYNDNSUpdate 0.6.15 and earlier, including the ipcheck function in dyndnsupdate.c, allow remote attackers who spoof a dyndns.org server to execute arbitrary code via unknown vectors.
References
Link | Resource |
---|---|
http://bugs.gentoo.org/show_bug.cgi?id=84659 | Vendor Advisory |
http://secunia.com/advisories/14663 | Vendor Advisory |
http://security.gentoo.org/glsa/glsa-200503-27.xml | Vendor Advisory |
http://bugs.gentoo.org/show_bug.cgi?id=84659 | Vendor Advisory |
http://secunia.com/advisories/14663 | Vendor Advisory |
http://security.gentoo.org/glsa/glsa-200503-27.xml | Vendor Advisory |
Configurations
History
20 Nov 2024, 23:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.gentoo.org/show_bug.cgi?id=84659 - Vendor Advisory | |
References | () http://secunia.com/advisories/14663 - Vendor Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200503-27.xml - Vendor Advisory |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:55
NVD link : CVE-2005-0830
Mitre link : CVE-2005-0830
CVE.ORG link : CVE-2005-0830
JSON object : View
Products Affected
xzabite
- dyndnsupdate
CWE