Debian Project

Debian testing security team - Advisory

DTSA-36-1

Date Reported:
May 22th, 2007
Affected Package:
mydns
Vulnerability:
multiple buffer overflows
Problem-Scope:
remote
Debian-specific:
No
CVE:
CVE-2007-2362

More information:
Multiple buffer overflows in MyDNS allow remote attackers to cause a denial of  
service (daemon crash) and possibly execute arbitrary code. 

For the testing distribution (lenny) this is fixed in version 1:1.1.0-7.1lenny1
For the unstable distribution (sid) this is fixed in version 1:1.1.0-8

This upgrade is recommended if you use mydns.

If you have the secure testing lines in your sources.list, you can update by running this command as root:
apt-get update && apt-get upgrade


To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:

deb http://security.debian.org/ testing/updates main contrib non-free
deb-src http://security.debian.org/ testing/updates main contrib non-free


Valid HTML 4.01! Valid CSS!