Dynamic DNS Update Client for Linux バージョンアップ

ちょっと前にNo-IPからメールでDynamic DNS Update Client for Linuxのセキュリティアップデートの案内が来ていた。バッファオーバーフローの脆弱性があった模様。

  1. Download a Free Dynamic DNS Update client for your dynamic IPのページ内にある「Download 2.1.9」リンクから最新版のClientをダウンロード
  2. アーカイブを展開
  3. 展開して出来た noip-2.1.9-1 ディレクトリに移動
  4. 一応Makefileの内容を確認してから、おもむろにmake (インストール先とか変えてる人は変更)
  5. サービス停止 (noip2デーモンがあがっていれば)
  6. 念のため前のバイナリをバックアップ # mv /usr/local/bin/noip2 /usr/local/bin/noip2-`date +%Y%m%d`
  7. さっき作ったバイナリをコピー # cp /tmp/noip-2.1.9-1/noip2 /usr/local/bin/
  8. デーモン起動
  9. ログ確認


Dec 7 15:36:05 server noip2[27295]: v2.1.9 daemon started with NAT enabled
Dec 7 15:36:06 server noip2[27295]: was already set to

とか出ていれば完了。今回はIPアドレスも変わっていないので、already set とか出てるけど。

ちなみに新規導入手順は Dynamic DNS サービスの自動更新設定で。


Security Advisory – 2008-11-22
Important: No-IP Linux DUC (Dynamic Update Client)

An updated version of the No-IP Linux Dynamic Update Client that fixes
a security issue is now available.

This update has been rated as having important security impact.

Versions 2.1.1- > 2.1.8 are prone to a stack-based buffer-overflow due to
a boundary error when processing HTTP responses received from the update
server. This can be exploited and cause a stack-based buffer overflow when
performing an update.

A malicious user could exploit this by faking the No-IP update server
via DNS poisoning or a man in the middle attack. This can cause a denial of
service (client crash) or
potentially execute arbitrary code on the computer the client is running on.

Users running versions 2.1.8 and older are encouraged to upgrade to the most
recent version, 2.1.9


The No-IP Team

Note: This email was sent from an unmonitored account. If you have any
questions or comments please open a trouble ticket at