Pufferüberlauf in dynamischem DNS-Code von dhcpd (Single Network Firewall)
ID: | MDKSA-2002:037-1 |
Distribution: | Mandrake |
Plattformen: | Mandrake Single Network Firewall 7.2 |
Datum: | Fr, 7. Juni 2002, 13:00 |
Referenzen: | Keine Angabe |
Applikationen: | ISC DHCP |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ Mandrake Linux Security Update Advisory ________________________________________________________________________ Package name: dhcp Advisory ID: MDKSA-2002:037-1 Date: May 30th, 2002 Original Advisory Date: May 29th, 2002 Affected versions: Single Network Firewall 7.2 ________________________________________________________________________ Problem Description: Fermin J. Serna discovered a problem in the dhcp server and client package from versions 3.0 to 3.0.1rc8, which are affected by a format string vulnerability that can be exploited remotely. By default, these versions of DHCP are compiled with the dns update feature enabled, which allows DHCP to update DNS records. The code that logs this update has an exploitable format string vulnerability; the update message can contain data provided by the attacker, such as a hostname. A successful exploitation could give the attacker elevated privileges equivalent to the user running the DHCP daemon, which is the user dhcpd in Mandrake Linux 8.x, but root in earlier versions. Update: The packages previously provided for SNF7.2 were the incorrect version. These new packages provide the proper version of dhcpd for SNF7.2. ________________________________________________________________________ References: http://www.cert.org/advisories/CA-2002-12.html http://www.ngsec.com/docs/advisories/NGSEC-2002-2.txt ________________________________________________________________________ Updated Packages: Single Network Firewall 7.2: 381344516b790101c2eee850879cb5aa snf7.2/RPMS/dhcp-3.0b2pl23-2.1mdk.i586.rpm 84e4567de46573b577b235079ce31e97 snf7.2/RPMS/dhcp-client-3.0b2pl23-2.1mdk.i586.rpm 2616a1003b248b0f27b7fb70abca57cf snf7.2/RPMS/dhcp-relay-3.0b2pl23-2.1mdk.i586.rpm 5865549fc6715b730ddff90194c15b96 snf7.2/SRPMS/dhcp-3.0b2pl23-2.1mdk.src.rpm ________________________________________________________________________ Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ________________________________________________________________________ To upgrade automatically, use MandrakeUpdate. The verification of md5 checksums and GPG signatures is performed automatically for you. If you want to upgrade manually, download the updated package from one of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig |