File: 2039.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (89 lines) | stat: -rw-r--r-- 2,052 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
Rule:

--
Sid:
2039

--
Summary:
The Dynamic Host Configuration Protocol (DHCP) daemon is used to issue 
dynamic IP addresses from a server to client machines. A vulnerability 
exists such that arbitrary code may be executed on the server using the 
credential of the super user (root).

--
Impact:
Execution of code and possible control of the targeted machine.

--
Detailed Information:
A format string vulnerabilty in some versions of dhcpd may lead to the 
execution of arbitrary code as the root user via a DNS server response. 
This is due to the unsafe logging of user data. The option NSUPDATE 
option in the configuration of dhcpd must be enabled, although this is a
default option in version 3.0 and later.

Two exploits for this vulnerability are known to exist.

--
Affected Systems:
ISC DHCPD 3.0
 Caldera OpenLinux Server 3.1 and 3.1.1
 Caldera OpenLinux Workstation 3.1 and 3.1.1
 Conectiva Linux 8.0
 MandrakeSoft Linux Mandrake 8.1, 8.1 ia64, 8.2, 8.2 ppc and 9.0
 MandrakeSoft Multi Network Firewall 8.2
 S.u.S.E. Linux 7.2, 7.3 and 8.0
 S.u.S.E. Linux Connectivity Server
 S.u.S.E. Linux Database Server
 S.u.S.E. Linux Enterprise Server 7 and S/390

ISC DHCPD 3.0.1 rc8 and ISC DHCPD 3.0.1 rc7
 FreeBSD FreeBSD 4.1.1, 4.2, 4.3, 4.4 and 4.5

ISC DHCPD 3.0.1 rc6
 S.u.S.E. Linux 8.0 and 8.0 i386

ISC DHCPD 3.0.1 rc5, ISC DHCPD 3.0.1 rc4
OpenPKG OpenPKG 1.0

ISC DHCPD 3.0.1 rc3, rc2 and rc1

--
Attack Scenarios:
The attacker could send a specially crafted packet to the dhcpd server or use one of the exploits widely available for this vulnerability.

--
Ease of Attack:
Simple

--
False Positives:
None Known

--
False Negatives:
None Known

--
Corrective Action:
Patches from the vendor should be applied as soon as possible.

Upgrade to ISC DHCPD 3.0.1 rc 9.

--
Contributors:
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

--
Additional References:

Bugtraq:
http://www.securityfocus.com/bid/4701

CVE:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0702

--