First published: Mon Apr 30 2007(Updated: )
Multiple buffer overflows in MyDNS 1.1.0 allow remote attackers to (1) cause a denial of service (daemon crash) and possibly execute arbitrary code via a certain update, which triggers a heap-based buffer overflow in update.c; and (2) cause a denial of service (daemon crash) via unspecified vectors that trigger an off-by-one stack-based buffer overflow in update.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
myDNS | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-2362 has a high severity due to its potential for remote code execution and denial of service.
To fix CVE-2007-2362, upgrade MyDNS to a version later than 1.1.0 that addresses the buffer overflow vulnerabilities.
CVE-2007-2362 specifically affects MyDNS version 1.1.0.
CVE-2007-2362 can be exploited for denial of service attacks and potentially for executing arbitrary code.
CVE-2007-2362 can be exploited by remote attackers who submit specially crafted updates to the MyDNS server.