Short Name |
HTTP:MISC:DYNDNSUPDATE |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
HTTP |
Keywords |
DynDnsUpdate Traffic |
Release Date |
2005/04/19 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects DynDnsUpdate, a DNS update tool. Because this software is currently unmaintained, it contains multiple known vulnerabilities. We strongly recommend that you seek alternate software solutions.
Multiple remote buffer overflow vulnerabilities affect Xzabite's dyndnsupdate. These issues are due to a failure of the application to properly validate the length of user-supplied strings prior to copying them into static process buffers. An attacker may exploit these issues to execute arbitrary code with the privileges of a user that activated the vulnerable application. This may facilitate unauthorized access or privilege escalation.