IPUpdate memm Module memmcat Overflow

2005-11-21T10:17:29
ID OSVDB:21036
Type osvdb
Reporter OSVDB
Modified 2005-11-21T10:17:29

Description

Vulnerability Description

A vulnerability has been reported in IPUpdate, which potentially can be exploited by malicious people to compromise a user's system. The issue is present in the "memmcat()" function when appending input into a heap-based buffer. This can cause a heap-based buffer overflow when an overly long reply is received from a DNS server. Successful exploitation requires that the user uses IPUpdate with a malicious DNS server.

Solution Description

Upgrade to version 1.1.0 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

A vulnerability has been reported in IPUpdate, which potentially can be exploited by malicious people to compromise a user's system. The issue is present in the "memmcat()" function when appending input into a heap-based buffer. This can cause a heap-based buffer overflow when an overly long reply is received from a DNS server. Successful exploitation requires that the user uses IPUpdate with a malicious DNS server.

References:

Secunia Advisory ID:17681 Related OSVDB ID: 21037 Other Advisory URL: http://sourceforge.net/project/shownotes.php?release_id=372666 CVE-2005-3780 Bugtraq ID: 15534