Pufferüberlauf in dhcp
ID: | RHSA-2005:212-01 |
Distribution: | Red Hat |
Plattformen: | Red Hat Enterprise Linux |
Datum: | Mi, 13. April 2005, 13:00 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1006 |
Applikationen: | ISC DHCP |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Moderate: dhcp security update Advisory ID: RHSA-2005:212-01 Advisory URL: https://rhn.redhat.com/errata/RHSA-2005-212.html Issue date: 2005-04-12 Updated on: 2005-04-12 Product: Red Hat Enterprise Linux CVE Names: CAN-2004-1006 --------------------------------------------------------------------- 1. Summary: An updated dhcp package that fixes a string format issue is now available for Red Hat Enterprise Linux 2.1. This update has been rated as having moderate security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 3. Problem description: The dhcp package provides the ISC Dynamic Host Configuration Protocol (DHCP) server and relay agent, dhcpd. DHCP is a protocol that allows devices to get their own network configuration information from a server. A bug was found in the way dhcpd logs error messages. A malicious DNS server could send a carefully crafted DNS reply and cause dhcpd to crash or possibly execute arbitrary code. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0446 to this issue. All users of dhcp should upgrade to this updated package, which contains a backported patch and is not vulnerable to this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/): 149513 - CAN-2004-1006 dhcp string format issue 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm 927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm i386: 0eb5f32af8caf92da9b1b9cb9a06d690 dhcp-2.0pl5-9.i386.rpm ia64: aea9d86d108f3e113816073c60cf9d67 dhcp-2.0pl5-9.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm 927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm ia64: aea9d86d108f3e113816073c60cf9d67 dhcp-2.0pl5-9.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/dhcp-2.0pl5-9.src.rpm 927826387feaf4ae2adde7202a94379e dhcp-2.0pl5-9.src.rpm i386: 0eb5f32af8caf92da9b1b9cb9a06d690 dhcp-2.0pl5-9.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package 7. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1006 8. Contact: The Red Hat security contact is |