HTTP: DynDnsUpdate Traffic

This signature detects DynDnsUpdate, a DNS update tool. Because this software is currently unmaintained, it contains multiple known vulnerabilities. We strongly recommend that you seek alternate software solutions.

Extended Description

Multiple remote buffer overflow vulnerabilities affect Xzabite's dyndnsupdate. These issues are due to a failure of the application to properly validate the length of user-supplied strings prior to copying them into static process buffers. An attacker may exploit these issues to execute arbitrary code with the privileges of a user that activated the vulnerable application. This may facilitate unauthorized access or privilege escalation.

Affected Products

Xzabite dyndnsupdate

Short Name
HTTP:MISC:DYNDNSUPDATE
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
CVE-2005-0830 DynDnsUpdate Traffic bid:12858
Release Date
04/19/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Xzabite

CVSS Score

7.5

Found a potential security threat?