Jump to content

Security Advisories (MDKSA-2004:061): dhcp


 Share

Recommended Posts

Mandrakesoft Security Advisories MDKSA-2004:061 : dhcp

 

Updated dhcp packages fix buffer overflow vulnerabilities

June 22nd, 2004

 

A vulnerability in how ISC's DHCPD handles syslog messages can allow a malicious attacker with the ability to send special packets to the DHCPD listening port to crash the daemon, causing a Denial of Service. It is also possible that they may be able to execute arbitrary code on the vulnerable server with the permissions of the user running DHCPD, which is usually root.

 

A similar vulnerability also exists in the way ISC's DHCPD makes use of the vsnprintf() function on system that do not support vsnprintf(). This vulnerability could also be used to execute arbitrary code and/or perform a DoS attack.The vsnprintf() statements that have this problem are defined after the vulnerable code noted above, which would trigger the previous problem rather than this one.

 

Thanks to Gregory Duchemin and Solar Designer for discovering these flaws.

 

The updated packages contain 3.0.1rc14 which is not vulnerable to these problems.Only ISC DHCPD 3.0.1rc12 and 3.0.1rc13 are vulnerable to these issues.

 

 

The released versions of Mandrake GNU/Linux affected are:

  • 9.2
  • 10.0

Full information about this advisory, including the updated packages, is available at:

www.mandrakesoft.com/security/advisories?name=MDKSA-2004:061

 

Other references:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0460

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0461

http://www.kb.cert.org/vuls/id/317350

http://www.kb.cert.org/vuls/id/654390

 

Posted automatically by aru (mdksec2mub v0.0.9)

Link to comment
Share on other sites

 Share

×
×
  • Create New...