Lucene search

K
gentooGentoo FoundationGLSA-200411-20
HistoryNov 11, 2004 - 12:00 a.m.

ez-ipupdate: Format string vulnerability

2004-11-1100:00:00
Gentoo Foundation
security.gentoo.org
9

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.006

Percentile

77.9%

Background

ez-ipupdate is a utility for updating host name information for a large number of dynamic DNS services.

Description

Ulf Harnhammar from the Debian Security Audit Project discovered a format string vulnerability in ez-ipupdate.

Impact

An attacker could exploit this to execute arbitrary code with the permissions of the user running ez-ipupdate, which could be the root user.

Workaround

There is no known workaround at this time.

Resolution

All ez-ipupdate users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-dns/ez-ipupdate-3.0.11_beta8-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-dns/ez-ipupdate<= 3.0.11_beta8UNKNOWN

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

EPSS

0.006

Percentile

77.9%