Debian Security Advisory DSA 1686-1 (no-ip)

Summary
The remote host is missing an update to no-ip announced via advisory DSA 1686-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201686-1
Insight
A buffer overflow has been discovered in the HTTP parser of the No-IP.com Dynamic DNS update client, which may result in the execution of arbitrary code. For the stable distribution (etch), this problem has been fixed in version 2.1.1-4+etch1. For the upcoming stable distribution (lenny) and the unstable distribution (sid), this problem has been fixed in version 2.1.7-11. We recommend that you upgrade your no-ip package.