vendor:
Dynamic Update Client (DUC)
by:
Alberto Ortega
7,5
CVSS
HIGH
Stack-based overflow
120
CWE
Product Name: Dynamic Update Client (DUC)
Affected Version From: 2.1.9
Affected Version To: 2.1.9
Patch Exists: NO
Related CWE: N/A
CPE: noip-2.1.9-1
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux x86
2013
No-IP Dynamic Update Client (DUC) 2.1.9 local IPaddress stack overflow
No-IP is probably the most used Dynamic DNS provider worldwide, their Dynamic Update Client (DUC) is present by default in tons of systems, software repositories and embedded devices. This exploit covers a stack-based overflow present in -i parameter, IPaddress variable name in source code. It is probably the most basic parameter, as this is the way to say the client that our IP has changed. For the PoC we will use the Linux x86 client version 2.1.9.
Mitigation:
API: https://www.noip.com/integrate/. If you are an embedded systems developer, you should write your own implementation of the client. If you are a repository maintainer, the best solution may be change the official client for another one. Compile the distributed binaries with some mitigations and include them by default in Makefile would help too.