Lucene search

K
osvGoogleOSV:DSA-592-1
HistoryNov 12, 2004 - 12:00 a.m.

ez-ipupdate - format string

2004-11-1200:00:00
Google
osv.dev
7

EPSS

0.006

Percentile

77.9%

Ulf Härnhammar from the Debian Security Audit Project discovered a
format string vulnerability in ez-ipupdate, a client for many dynamic
DNS services. This problem can only be exploited if ez-ipupdate is
running in daemon mode (most likely) with many but not all service
types.

For the stable distribution (woody) this problem has been fixed in
version 3.0.11b5-1woody2.

For the unstable distribution (sid) this problem has been fixed in
version 3.0.11b8-8.

We recommend that you upgrade your ez-ipupdate package.