Vulnerability Details : CVE-2008-5297
Buffer overflow in No-IP DUC 2.1.7 and earlier allows remote HTTP servers to execute arbitrary code via a crafted response to a DNS update request, related to a missing length check in the GetNextLine function.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2008-5297
Probability of exploitation activity in the next 30 days: 2.11%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 88 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-5297
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST |
CWE ids for CVE-2008-5297
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-5297
-
http://xenomuta.tuxfamily.org/exploits/noIPwn3r.c
Exploit
-
http://www.openwall.com/lists/oss-security/2008/11/21/15
-
http://securityreason.com/securityalert/4672
-
http://git.debian.org/?p=collab-maint/no-ip.git;a=commit;h=60ed93621ff36d9731ba5d9f9336d6eb91122302
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/46696
-
http://www.securityfocus.com/bid/32344
-
https://www.exploit-db.com/exploits/7151
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506179
-
http://www.debian.org/security/2008/dsa-1686
-
http://security.gentoo.org/glsa/glsa-200901-12.xml
Products affected by CVE-2008-5297
- cpe:2.3:a:vitalwerks:no-ip_duc:*:*:*:*:*:*:*:*
- cpe:2.3:a:vitalwerks:no-ip_duc:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:vitalwerks:no-ip_duc:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:vitalwerks:no-ip_duc:2.0.3:*:*:*:*:*:*:*