ez-ipupdate: Format string vulnerability — GLSA 200411-20

ez-ipupdate contains a format string vulnerability that could lead to execution of arbitrary code.

Affected packages

net-dns/ez-ipupdate on all architectures
Affected versions <= 3.0.11_beta8
Unaffected versions >= 3.0.11_beta8-r1

Background

ez-ipupdate is a utility for updating host name information for a large number of dynamic DNS services.

Description

Ulf Harnhammar from the Debian Security Audit Project discovered a format string vulnerability in ez-ipupdate.

Impact

An attacker could exploit this to execute arbitrary code with the permissions of the user running ez-ipupdate, which could be the root user.

Workaround

There is no known workaround at this time.

Resolution

All ez-ipupdate users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-dns/ez-ipupdate-3.0.11_beta8-r1"

References

Release date
November 11, 2004

Latest revision
November 11, 2004: 01

Severity
high

Exploitable
remote

Bugzilla entries