<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> <glsa id="200411-20"> <title>ez-ipupdate: Format string vulnerability</title> <synopsis> ez-ipupdate contains a format string vulnerability that could lead to execution of arbitrary code. </synopsis> <product type="ebuild">ez-ipupdate</product> <announced>2004-11-11</announced> <revised count="01">2004-11-11</revised> <bug>69658</bug> <access>remote</access> <affected> <package name="net-dns/ez-ipupdate" auto="yes" arch="*"> <unaffected range="ge">3.0.11_beta8-r1</unaffected> <vulnerable range="le">3.0.11_beta8</vulnerable> </package> </affected> <background> <p> ez-ipupdate is a utility for updating host name information for a large number of dynamic DNS services. </p> </background> <description> <p> Ulf Harnhammar from the Debian Security Audit Project discovered a format string vulnerability in ez-ipupdate. </p> </description> <impact type="high"> <p> An attacker could exploit this to execute arbitrary code with the permissions of the user running ez-ipupdate, which could be the root user. </p> </impact> <workaround> <p> There is no known workaround at this time. </p> </workaround> <resolution> <p> All ez-ipupdate users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=net-dns/ez-ipupdate-3.0.11_beta8-r1"</code> </resolution> <references> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0980">CAN-2004-0980</uri> <uri link="http://lists.netsys.com/pipermail/full-disclosure/2004-November/028590.html">Full Disclosure Announcement</uri> </references> <metadata tag="submitter" timestamp="2004-11-09T20:12:06Z"> jaervosz </metadata> <metadata tag="bugReady" timestamp="2004-11-11T14:43:17Z"> jaervosz </metadata> </glsa>