Debian testing security team - Advisory
DTSA-36-1
Date Reported:
May 22th, 2007
Affected Package:
mydns
Vulnerability:
multiple buffer overflows
Problem-Scope:
remote
Debian-specific:
No
CVE:
CVE-2007-2362
More information:
Multiple buffer overflows in MyDNS allow remote attackers to cause a denial of
service (daemon crash) and possibly execute arbitrary code.
For the testing distribution (lenny) this is fixed in version 1:1.1.0-7.1lenny1
For the unstable distribution (sid) this is fixed in version 1:1.1.0-8
This upgrade is recommended if you use mydns.
If you have the secure testing lines in your sources.list, you can update by running this command as root:
apt-get update && apt-get upgrade
To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:
deb http://security.debian.org/ testing/updates main contrib non-free
deb-src http://security.debian.org/ testing/updates main contrib non-free